Summary
This host is running Habari and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site and determine the full path to the web root directory and other potentially sensitive information.
Impact Level: Application.
Solution
Upgrade to Habari version 0.6.6 or later
For updates refer to http://habariproject.org/en/download
Insight
The flaws are due to
- Input passed to the 'additem_form' parameter in 'system/admin/dash_additem.php' and 'status_data[]' parameter in 'system/admin/dash_status.php' is not properly sanitised before being returned to the user.
- Error in '/system/admin/header.php' and '/system/admin/comments_items.php' script, which generate an error that will reveal the full path of the script.
Affected
Habari version 0.6.5
References
Severity
Classification
-
CVE CVE-2010-4607, CVE-2010-4608 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities