Xataface WebAuction and Xataface Librarian DB Multiple Vulnerabilities.
Xataface WebAuction and Xataface Librarian DB Multiple Vulnerabilities. Input passed via the '-action' parameter in 'index.php' is not properly verified. This can be exploited to read complete installation path. Input passed via the 'list&-table' and '-action' parameter in 'index.php' page is not properly verified before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL queries. Input passed via the '-action' nad 'list&-table' parameter in 'index.php' page is not properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site. Input passed via the 'list&-lang' and '-table' parameter in 'index.php' page is not properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site. Input passed via the '-action' parameter in 'index.php' page is not properly sanitised before being used to include files. This can be exploited to include arbitrary files from local resources. Input passed via the '-action' parameter in 'index.php' page is not properly sanitised before being used to include files. This can be exploited to include arbitrary files from remote resources.