SB2012100201 - Multiple vulnerabilities in ocportal.com ocPortal
Published: October 2, 2012 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2012-5234)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Open redirect vulnerability in index.php in ocPortal before 7.1.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter.
2) Cross-site scripting (CVE-ID: CVE-2012-1470)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in code_editor.php in ocPortal before 7.1.6 when processing the (1) path or (2) line parameters. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Path traversal (CVE-ID: CVE-2012-1471)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in catalogue_file.php in ocPortal before 7.1.6. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to read arbitrary files via a . (dot dot) in the file parameter.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.