CVE-2005-2053

Just another flat file (JAF) CMS before 3.0 Final allows remote attackers to obtain sensitive information via (1) an * (asterisk) in the id parameter, (2) a blank id parameter, or (3) an * (asterisk) in the disp parameter to index.php, which reveals the path in an error message. NOTE: a followup suggests that this may be a directory traversal or file inclusion vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:salims_softhouse:jaf_cms:1.0:final:*:*:*:*:*:*
cpe:2.3:a:salims_softhouse:jaf_cms:1.5:*:*:*:*:*:*:*
cpe:2.3:a:salims_softhouse:jaf_cms:2.0:beta:*:*:*:*:*:*
cpe:2.3:a:salims_softhouse:jaf_cms:2.0:final:*:*:*:*:*:*
cpe:2.3:a:salims_softhouse:jaf_cms:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:salims_softhouse:jaf_cms:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:salims_softhouse:jaf_cms:2.5:*:*:*:*:*:*:*
cpe:2.3:a:salims_softhouse:jaf_cms:3.0:rc:*:*:*:*:*:*
cpe:2.3:a:salims_softhouse:jaf_cms:3.0:rc_fixed:*:*:*:*:*:*
cpe:2.3:a:salims_softhouse:jaf_cms:3.0:rc2:*:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () http://echo.or.id/adv/adv20-theday-2005.txt - Exploit, Vendor Advisory () http://echo.or.id/adv/adv20-theday-2005.txt - Exploit, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=111954840611126&w=2 - () http://marc.info/?l=bugtraq&m=111954840611126&w=2 -
References () http://marc.info/?l=bugtraq&m=111990004028512&w=2 - () http://marc.info/?l=bugtraq&m=111990004028512&w=2 -

Information

Published : 2005-06-28 04:00

Updated : 2024-11-20 23:58


NVD link : CVE-2005-2053

Mitre link : CVE-2005-2053

CVE.ORG link : CVE-2005-2053


JSON object : View

Products Affected

salims_softhouse

  • jaf_cms