Greenstone is prone to the following security vulnerabilities: 1. A file-disclosure vulnerability 2. A cross-site scripting vulnerability
3. A security weakness 4. A security-bypass vulnerability
Credit:
The information has been provided by Akastep.
Attackers can exploit these issues to view local files, bypass certain security restriction, steal cookie-based authentication, or execute arbitrary scripts in the context of the browser.
Attackers can exploit these issues through a browser. To exploit a cross-site scripting vulnerability, an attacker must entice an unsuspecting user to follow a malicious URI.
The following example URI and example data are available:
http://www.example.com/gsdl/cgi-bin/library.cgi?a=status&p=collectioninfo&pr=7&c=alert("OwnEd");
http://downloads.securityfocus.com/vulnerabilities/exploits/56662.txt