XCMS "Lang" Parameter Processing Arbitrary Local File Inclusion Vulnerability
Description
A vulnerability has been identified in XCMS, which could be exploited by remote attackers to gain knowledge of sensitive information. This issue is caused by an input validation error in the "Module/Galerie.php" script when processing the "Lang" parameter, which could be exploited by remote attackers to include or disclose the contents of arbitrary files with the privileges of the web server.
Note : The "Module/Galerie.php" script does not validate the "Ent" parameter before being passed as an argument to an "opendir()" call, which could be exploited by attackers to list the contents of arbitrary directories.