Summary
Batavi is prone to multiple local file-include and cross-site scripting vulnerabilities because it fails to properly sanitize user- supplied input.
An attacker can exploit the local file-include vulnerabilities using directory-traversal strings to view and execute local files within the context of the affected application. Information harvested may aid in further attacks.
The attacker may leverage the cross-site scripting issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie- based authentication credentials and launch other attacks.
Batavi 1.0 is vulnerable
other versions may also be affected.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache ActiveMQ Source Code Information Disclosure Vulnerability
- 12Planet Chat Server one2planet.infolet.InfoServlet XSS
- Apache Tomcat HTTP BIO Connector Information Disclosure Vulnerability
- Adobe ColdFusion HTTP Response Splitting Vulnerability
- 2532|Gigs Directory Traversal And SQL Injection Multiple Vulnerabilities