|
Description
|
|
Multiple vulnerabilities were identified in PHPKIT, which could be exploited by malicious users to execute arbitrary commands, disclose sensitive information, or conduct directory traversal, cross site scripting and SQL injection attacks.
The first issue is due to input validation errors in the "login/profile.php", "login/userinfo.php", "admin/admin.php", "imcenter.php", "statistics", "forum" and "Guestbook" scripts when processing specially crafted parameters, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second flaw is due to input validation errors in the "login/userinfo.php" and "include.php" scripts that do not properly filter specially crafted "id" and "PHPKITSID" parameters, which may be exploited by malicious users to conduct SQL injection attacks.
The third vulnerability is due to an input validation error when processing a specially crafted "path" variable, which may be exploited by attackers to disclose the contents of arbitrary files on the local disk.
The fourth flaw is due to multiple errors in the template engine that does not properly validate certain parameters before calling the "eval()" statement, which could be exploited by remote attackers to execute arbitrary PHP commands with the privileges of the web server.
|