PG eLMS Pro vDEC_2007_01 Multiple Remote Vulnerabilities (XSS/bSQLi)

XSS: Input passed via the ‘subject’, ‘name’, ‘email’ and ‘body’ parameters to ‘contact_us.php’ script is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

bSQLi: Input passed via the ‘lang_code’ GET parameter to index.php and login.php in ‘/www/core/language.class.php’, and ‘login’ POST parameter to login.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Advisory: ZSL-2011-5027, ZSL-2011-5028

Comment are closed.