Description
|
|
Two vulnerabilities have been discovered in POSH, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks.
1) Input passed to the "lang" parameter in portal/scr_changelang.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes.
2) Input passed to the "message" parameter in portal/login.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are confirmed in version 3.1.1. Prior versions may also be affected.
|