Description
|
|
John Leitch has discovered two vulnerabilities in bitweaver, which can be exploited by malicious people to conduct cross-site scripting and to disclose potentially sensitive information.
1) Input passed via the "style" parameter to wiki/rankings.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes.
2) Input passed via the "fImg" parameter to themes/preview_image.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are confirmed in version 2.7. Other versions may also be affected.
|