Security
Headlines
HeadlinesLatestCVEs

Tag

#php

CVE-2023-3534

A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-233286 is the identifier assigned to this vulnerability.

CVE
#sql#vulnerability#web#php
Lost And Found Information System 1.0 SQL Injection

Lost and Found Information System version 1.0 suffers from a remote SQL injection vulnerability.

DANGEROUS MAILER-CLONED 2.0 Information Disclosure

DANGEROUS MAILER-CLONED version 2.0 suffers from an information leakage vulnerability.

DaillyTools Remote Command Execution

DaillyTools suffers from a remote command execution vulnerability.

CakePHP Test Suite 2.7.0 Cross Site Scripting

CakePHP Test Suite version 2.7.0 suffers from a cross site scripting vulnerability.

Aplikasi Sistem Informasi Kelulusan CMS 1.0.9 Local File Inclusion

Aplikasi Sistem Informasi Kelulusan CMS version 1.0.9 suffers from a local file inclusion vulnerability.

AGVirtues Galeria 2.0 SQL Injection

AGVirtues Galeria version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

GHSA-wj7q-gjg8-3cpm: league/oauth2-server key exposed in exception message when passing as a string and providing an invalid pass phrase

### Impact Servers that passed their keys to the CryptKey constructor as as string instead of a file path will have had that key included in a LogicException message if they did not provide a valid pass phrase for the key where required. ### Patches This issue has been patched so that the provided key is no longer exposed in the exception message in the scenario outlined above. Users should upgrade to version 8.5.3 to receive the patch ### Workarounds We recommend upgrading the oauth2-server to the latest version. If you are unable to upgrade you can avoid this security issue by passing your key as a file instead of a string. ### References [Pull request](https://github.com/thephpleague/oauth2-server/pull/1353) for the applied fix.

GHSA-6r5g-cq4q-327g: Statamic's Antlers sanitizer cannot effectively sanitize malicious SVG

Antlers sanitizer cannot effectively sanitize malicious SVG ### Summary The SVG tag does not sanitize malicious SVG. Therefore, an attacker can exploit this vulnerability to perform XSS attacks using SVG, even when using the `sanitize` function. ### Details Regarding the previous discussion mentioned [here](https://github.com/statamic/cms/security/advisories/GHSA-jvw9-rrc5-39g6#advisory-comment-84322), it has been identified that the default blacklist in the **FilesFieldtypeController** (located at this [link](https://github.com/statamic/cms/blob/f806b6b007ddcf066082eef175653c5beaa96d60/src/Http/Controllers/CP/Fieldtypes/FilesFieldtypeController.php#L15)) only blocks certain file extensions such as php, php3, php4, php5, and phtml. This allows a malicious user to upload a manipulated SVG file disguised as a social media icon, potentially triggering an XSS vulnerability. ### PoC Screenshot ![image](https://user-images.githubusercontent.com/17494868/251093022-15f949e9-2014-4069-850b-8...