Lucene search

K

Webgalamb Security Vulnerabilities

cve
cve

CVE-2018-19514

In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval()....

9.8CVSS

9.7AI Score

0.011EPSS

2019-03-21 04:00 PM
28
cve
cve

CVE-2018-19509

wg7.php in Webgalamb 7.0 makes opportunistic calls to htmlspecialchars() instead of using a templating engine with proper contextual encoding. Because it is possible to insert arbitrary strings into the database, any JavaScript could be executed by the administrator, leading to...

6.1CVSS

6.2AI Score

0.004EPSS

2019-03-21 04:00 PM
22
cve
cve

CVE-2018-19511

wg7.php in Webgalamb 7.0 lacks security measures to prevent CSRF attacks, as demonstrated by wg7.php?options=1 to change the administrator...

6.5CVSS

6.4AI Score

0.002EPSS

2019-03-21 04:00 PM
15
cve
cve

CVE-2018-19515

In Webgalamb through 7.0, system/ajax.php functionality is supposed to be available only to the administrator. However, by using one of the bgsend, atment_sddd1xGz, or xls_bgimport query parameters, most of these methods become available to unauthenticated...

9.8CVSS

9.4AI Score

0.015EPSS

2019-03-21 04:00 PM
17
cve
cve

CVE-2018-19513

In Webgalamb through 7.0, log files are exposed to the internet with predictable files/logs/sql_error_log/YYYY-MM-DD-sql_error_log.log filenames. The log file could contain sensitive client data (email addresses) and also facilitates exploitation of SQL injection...

7.5CVSS

7.9AI Score

0.003EPSS

2019-03-21 04:00 PM
18
cve
cve

CVE-2018-19510

subscriber.php in Webgalamb through 7.0 is vulnerable to SQL injection via the Client-IP HTTP request...

9.8CVSS

9.7AI Score

0.005EPSS

2019-03-21 04:00 PM
19
cve
cve

CVE-2018-19512

In Webgalamb through 7.0, a system/ajax.php "wgmfile restore" directory traversal vulnerability could lead to arbitrary code execution by authenticated administrator users, because PHP files are restored under the document root...

7.2CVSS

7.2AI Score

0.002EPSS

2019-03-21 04:00 PM
18