vendor: https://github.com/renlok/WeBid
version: <= 1.2.2
php version: 7.x
vendor: https://github.com/renlok/WeBid
version: <= 1.2.2
php version: 7.x
vendor: https://github.com/sruupl/batflat
version: <= 1.3.6
An external control of file name or path vulnerability (CWE-73) is in inc/modules/settings/Admin.php
.
At line 371, the file path and content to write are both partially controlled by the attacker.
Although the extension of the file is limited to .ini
, the attacker can write a .user.ini
file
that is supported by PHP running on fastcgi to make arbitrary code execution.
vendor: online-rental-property-manager
version: <= 7.1, fix in edb404c4e31966338762de3022d0e6cfac63ca2b
An XSS vulnerability (Cross site Scripting) (CWE-79) is in app/hooks/applicants_and_tenants_filter.php
.
At line 93, The $FilterValue[1]
is inserted into javascript string represented using single quotes
and is escaped by htmlspecialchars
. However, htmlspecialchars
doesn't escape '
without
the ENT_QUOTES
flag. Therefore, an attacker can still exploit this by using '
to break out of
the javascript string and inject malicious Javascript code.
This allows attackers to obtain cookies of administrator and other users and fake their login using obtained cookies.
vendor: ihofmann/open-websoccer: A PHP based online football/soccer manager game. (github.com)
version: <= 5.2.3
php version: 5.x
An XSS vulnerability (Cross site Scripting) (CWE-79) is in websoccer/admin/forgot-password.php
.
At line 129, The $_POST['inputEmail']
is inserted into the value attribute of <input>
tag and is escaped by escapeOutput
,
which is actually employs htmlspecialchars($message, ENT_COMPAT, 'UTF-8')
at line 30
of websoccer/admin/functions.inc.php
.
Vendor: https://github.com/xiebruce/PicUploader
version: before https://github.com/xiebruce/PicUploader/commit/fcf82eacc4ad2e62b6182ca152a48bda739157be
A SQL injection vulnerability is in https://github.com/xiebruce/PicUploader/blob/2ef5b21cb2ae831ff5a56473b0f1315a6f81ff65/settings/HistoryModel.php#L31
public function createOne($data){
$uploadTime = date('Y-m-d H:i:s');
$sql = 'INSERT INTO `'.self::$tableName.'`(`filename`, `url`, `size`, `created_at`, `mime`, `md5`, `upload_server`) VALUES("'.$data['filename'].'", "'.$data['url'].'", '.$data['size'].', "'.$uploadTime.'", "'.$data['mime'].'", "'.$data['md5'].'", "'.$data['uploadServer'].'")';
Vendor: https://github.com/xiebruce/PicUploader
version: before https://github.com/xiebruce/PicUploader/commit/fcf82eacc4ad2e62b6182ca152a48bda739157be
A SQL injection vulnerability is in https://github.com/xiebruce/PicUploader/blob/2ef5b21cb2ae831ff5a56473b0f1315a6f81ff65/settings/HistoryController.php#L189.
public function getByConditions($conditionArr){
$model = new HistoryModel();
try {
Vendor: https://github.com/xiebruce/PicUploader
version: before https://github.com/xiebruce/PicUploader/commit/fcf82eacc4ad2e62b6182ca152a48bda739157be
A SQL injection vulnerability is in https://github.com/xiebruce/PicUploader/blob/2ef5b21cb2ae831ff5a56473b0f1315a6f81ff65/settings/HistoryController.php#L107
$keyword = isset($_GET['keyword']) ? trim($_GET['keyword']) : '';
$model = new HistoryModel();
vendor: kirilkirkov/Ecommerce-CodeIgniter-Bootstrap (github.com)
version: before Vulnerability fixes from Lion Tree · kirilkirkov/Ecommerce-CodeIgniter-Bootstrap@d22b54e (github.com)
A file inclusion vulnerability is in getLangFolderForEdit
method of application/modules/admin/controllers/advanced_settings/Languages.php
.
By controlling $_GET['editLang']
, the attacker can make the server include .php
files under specific directory.
The attacker can use CVE-2024-31821
to write malicous PHP code in log-xxxx.php
and use this vulnerability to include PHP files under application/logs/
(At this point, BASEPATH
has been set, allowing bypass of the check at the beginning of the log file.),
which leads to remote code execution.
vendor: kirilkirkov/Ecommerce-CodeIgniter-Bootstrap (github.com)
version: before Vulnerability fixes from Lion Tree · kirilkirkov/Ecommerce-CodeIgniter-Bootstrap@d22b54e (github.com)
A second-order SQL injection vulnerability is in manageQuantitiesAndProcurement
method of application/modules/admin/models/Orders_model.php
.
The $product['product_quantity']
and $product['product_info']['id']
are inserted into SQL statements without any sanitizers.
These two values come from previous query result and users can control them in setOrder
method of application/models/Public_model.php
,
which leads to a SQL injection.
vendor: kirilkirkov/Ecommerce-CodeIgniter-Bootstrap (github.com)
version: before Vulnerability fixes from Lion Tree · kirilkirkov/Ecommerce-CodeIgniter-Bootstrap@d22b54e (github.com)
An arbitrary file deletion (CWE-73) vulnerability is in application/modules/admin/controllers/ecommerce/Publish.php
.
In the method removeSecondaryImage
, the attacker can delete any file in the server by controlling $_POST['folder']
and
$_POST['image']
after authorization.
public function removeSecondaryImage()