Description
|
|
Two vulnerabilities have been identified in Wikkawiki, which could be exploited by attackers to bypass security restrictions or execute arbitrary scripting code.
The first issue is due to an error in the "Method()" [wikka.php] function when calling "strstr()" and "strrpos()", which could be exploited by attackers to bypass security restrictions and gain unauthorized access to arbitrary PHP scripts.
The second flaw is due to an input validation error in the "formatters/wakka.php" script that does not validate the "url" variable, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
|