Description
|
|
Multiple vulnerabilities have been identified in Bitweaver, which may be exploited by attackers to execute arbitrary commands and scripting code, or disclose sensitive information.
The first flaw is due to an input validation error in the "articles/index.php" script that does not validate the "feedback" parameter, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The second issue is due to an error in the "users/index.php" script that does not properly handle an invalid "sort_mode" parameter, which could be exploited by remote attackers to determine the installation path.
The third vulnerability is due to is due to an input validation error in the file upload functionality that does not properly validate file extensions, which could be exploited by remote attackers to upload malicious PHP scripts and execute arbitrary commands on a vulnerable web server where the "mod_mime" module is installed.
|