iWebNegar is a web log and content management system. It is implemented in PHP with a MySQL database backend. iWebNegar is affected by multiple remote vulnerabilities. These issues are due a failure of the application to properly sanitize user-supplied input prior to including it in dynamically generated content and an access validation failure. The first issue is an access validation vulnerability that may allow a remote, unauthenticated attacker to arbitrary clear all settings added through the administrator 'config.php' script. The second issue is an HTML injection vulnerability in the comment functionality. An attacker may leverage the HTML injection issue to have arbitrary HTML and script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. An attacker may leverage the access validation issue to manipulate configuration settings, potentially compromising application security.
iWebNegar is a web log and content management system. It is implemented in PHP with a MySQL database backend. iWebNegar is affected by multiple remote vulnerabilities. These issues are due a failure of the application to properly sanitize user-supplied input prior to including it in dynamically generated content and an access validation failure. The first issue is an access validation vulnerability that may allow a remote, unauthenticated attacker to arbitrary clear all settings added through the administrator 'config.php' script. The second issue is an HTML injection vulnerability in the comment functionality. An attacker may leverage the HTML injection issue to have arbitrary HTML and script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. An attacker may leverage the access validation issue to manipulate configuration settings, potentially compromising application security.