Description
|
|
Multiple vulnerabilities have been reported in CUBIC CMS, which can be exploited by malicious people to disclose potentially sensitive information and conduct SQL injection attacks.
1) An error related to the "Controller Not Found" exception management can be exploited to disclose the full installation path in an error message.
2) Input passed via the "resource_id" and "version_id" GET parameters to /recursos/agent.php and via the "login" and "pass" POST parameters to /login.usuario is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
3) Input passed via the "path" GET parameter to /recursos/agent.php is not properly sanitised before being used to read files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences.
The vulnerabilities are reported in versions 5.1.1, 5.1.2, and 5.2. Other versions may also be affected.
|