Habari Multiple Vulnerabilities

Summary
This host is running Habari and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site and determine the full path to the web root directory and other potentially sensitive information. Impact Level: Application.
Solution
Upgrade to Habari version 0.6.6 or later For updates refer to http://habariproject.org/en/download
Insight
The flaws are due to - Input passed to the 'additem_form' parameter in 'system/admin/dash_additem.php' and 'status_data[]' parameter in 'system/admin/dash_status.php' is not properly sanitised before being returned to the user. - Error in '/system/admin/header.php' and '/system/admin/comments_items.php' script, which generate an error that will reveal the full path of the script.
Affected
Habari version 0.6.5
References