SB2018052604 - Multiple vulnerabilities in PHPMyWind
Published: May 26, 2018 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2018-17130)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing data passed via an HTTP Referer header. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Code Injection (CVE-ID: CVE-2018-17131)
The vulnerability allows a remote privileged user to execute arbitrary code.
admin/web_config.php in PHPMyWind 5.5 allows Admin users to execute arbitrary code via the varvalue field.
3) Code Injection (CVE-ID: CVE-2018-17132)
The vulnerability allows a remote privileged user to execute arbitrary code.
admin/goods_update.php in PHPMyWind 5.5 allows Admin users to execute arbitrary code via the attrvalue[] array parameter.
4) Code Injection (CVE-ID: CVE-2018-17133)
The vulnerability allows a remote privileged user to execute arbitrary code.
admin/web_config.php in PHPMyWind 5.5 allows Admin users to execute arbitrary code via the rewrite url setting.
5) Code Injection (CVE-ID: CVE-2018-17134)
The vulnerability allows a remote privileged user to execute arbitrary code.
admin/web_config.php in PHPMyWind 5.5 allows Admin users to execute arbitrary code via the cfg_author field in conjunction with a crafted cfg_webpath field.
6) Cross-site scripting (CVE-ID: CVE-2018-11487)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing the cid parameter to newsshow.php, or the query string to news.php or about.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.