Tag
#php
Acronis Cyber Infrastructure version 5.0.1-61 suffers from a cross site request forgery vulnerability.
Vehicle Service Management System version 1.0 suffers from a WYSIWYG code injection vulnerability.
Vehicle Service Management System version 1.0 suffers from a PHP code injection vulnerability.
Transport Management System version 1.0 suffers from an arbitrary file upload vulnerability.
Transport Management System version 1.0 suffers from a PHP code injection vulnerability.
ManageEngine ADManager version 7183 suffers from a password hash disclosure vulnerability.
The building management system suffers from an authenticated arbitrary file disclosure vulnerability. Input passed through the 'file' GET parameter through the 'downloadDb.php' script is not properly verified before being used to download database files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.
### Impact This vulnerability allows an attacker to inject arbitrary HTML/JavaScript code through the media download URL in Sulu CMS. It affects the SuluMediaBundle component. The vulnerability is a Reflected Cross-Site Scripting (XSS) issue, which could potentially allow attackers to steal sensitive information, manipulate the website's content, or perform actions on behalf of the victim. ### Patches The problem has not been patched yet. Users should upgrade to patched versions once they become available. Currently affected versions are: * 2.6.4 * 2.5.20 ### Workarounds Until an official patch is released, users can implement additional input validation and output encoding for the 'slug' parameter in the MediaStreamController's downloadAction method. Alternatively, configuring a Web Application Firewall (WAF) to filter potentially malicious input could serve as a temporary mitigation. ### References * GitHub repository: https://github.com/sulu/sulu * Vulnerable code: https://g...
dizqueTV version 1.5.3 suffers from a remote code execution vulnerability.
Debian Linux Security Advisory 5780-1 - Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in incorrect parsing of multipart/form-data, bypass of the cgi.force_direct directive or incorrect logging.