CVE-2005-4368

roundcube webmail Alpha, with a default high verbose level ($rcmail_config['debug_level'] = 1), allows remote attackers to obtain the full path of the application via an invalid_task parameter, which leaks the path in an error message.
Configurations

Configuration 1 (hide)

cpe:2.3:a:roundcube:webmail:-:alpha:*:*:*:*:*:*

History

21 Nov 2024, 00:04

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/418851/100/0/threaded - () http://www.securityfocus.com/archive/1/418851/100/0/threaded -
References () http://www.securityfocus.com/archive/1/419710/100/0/threaded - () http://www.securityfocus.com/archive/1/419710/100/0/threaded -
References () http://www.securityfocus.com/archive/1/422168/100/0/threaded - () http://www.securityfocus.com/archive/1/422168/100/0/threaded -

Information

Published : 2005-12-20 02:03

Updated : 2024-11-21 00:04


NVD link : CVE-2005-4368

Mitre link : CVE-2005-4368

CVE.ORG link : CVE-2005-4368


JSON object : View

Products Affected

roundcube

  • webmail
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor