Description
|
|
High-Tech Bridge SA has reported two vulnerabilities in Horizon Quick CMS, which can be exploited by malicious people to disclose sensitive information and conduct SQL injection attacks.
1) Input passed via the "start" parameter to /lib/functions/d-load.php is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences.
2) Input passed via the "category" parameter to download.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerabilities are confirmed in version 3.5.2 and reported in version 4.0. Other versions may also be affected.
|