Ens

Webgalamb

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.33%
  • Veröffentlicht 21.03.2019 16:00:31
  • Zuletzt bearbeitet 21.11.2024 03:58:03

wg7.php in Webgalamb 7.0 makes opportunistic calls to htmlspecialchars() instead of using a templating engine with proper contextual encoding. Because it is possible to insert arbitrary strings into the database, any JavaScript could be executed by t...

Exploit
  • EPSS 0.72%
  • Veröffentlicht 21.03.2019 16:00:31
  • Zuletzt bearbeitet 21.11.2024 03:58:03

subscriber.php in Webgalamb through 7.0 is vulnerable to SQL injection via the Client-IP HTTP request header.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 21.03.2019 16:00:31
  • Zuletzt bearbeitet 21.11.2024 03:58:03

wg7.php in Webgalamb 7.0 lacks security measures to prevent CSRF attacks, as demonstrated by wg7.php?options=1 to change the administrator password.

Exploit
  • EPSS 3.44%
  • Veröffentlicht 21.03.2019 16:00:31
  • Zuletzt bearbeitet 21.11.2024 03:58:04

In Webgalamb through 7.0, a system/ajax.php "wgmfile restore" directory traversal vulnerability could lead to arbitrary code execution by authenticated administrator users, because PHP files are restored under the document root directory.

Exploit
  • EPSS 0.6%
  • Veröffentlicht 21.03.2019 16:00:31
  • Zuletzt bearbeitet 21.11.2024 03:58:04

In Webgalamb through 7.0, log files are exposed to the internet with predictable files/logs/sql_error_log/YYYY-MM-DD-sql_error_log.log filenames. The log file could contain sensitive client data (email addresses) and also facilitates exploitation of ...

Exploit
  • EPSS 5.26%
  • Veröffentlicht 21.03.2019 16:00:31
  • Zuletzt bearbeitet 21.11.2024 03:58:04

In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a mal...

Exploit
  • EPSS 5.69%
  • Veröffentlicht 21.03.2019 16:00:31
  • Zuletzt bearbeitet 21.11.2024 03:58:04

In Webgalamb through 7.0, system/ajax.php functionality is supposed to be available only to the administrator. However, by using one of the bgsend, atment_sddd1xGz, or xls_bgimport query parameters, most of these methods become available to unauthent...