Description
|
|
Multiple vulnerabilities have been identified in Php-Stats, which could be exploited by remote attackers to execute arbitrary commands or disclose sensitive information.
The first issue is due to input validation errors in the "admin.php" script that does not properly validate the "option[language]" and "option[template]" parameters, which could be exploited by remote attackers to include local files.
The second flaw is due to an input validation error in the "admin.php" script when handling the "option[prefix]" variable, which could be exploited by malicious people to conduct SQL injection attacks.
The third vulnerability is due to an error in the "admin.php" file when handling the "option[admin_pass]" variable, which could be exploited by remote attackers to obtain adminitrative privileges and inject arbitrary PHP commands via the "config.php" or "option/php-stats-options.php" scripts.
The fourth issue is due to an input validation error in the "click.php" script that does not properly validate the "REMOTE_ADDR" HTTP header before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
The fifth issue is due to a design error where the "checktables.php" is accessible without requiring user authentication, which could be exploited by remote attackers to gain knowledge of sensitive information (e.g. table_prefix).
|