Pixelpost 1.5 beta 1 and earlier allows remote attackers to obtain configuration information via a direct request to includes/phpinfo.php, which calls the phpinfo function. NOTE: the vendor has disputed some issues from the original disclosure, but due to the vagueness of the dispute, it is not clear whether the vendor is disputing this particular issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://forum.pixelpost.org/showthread.php?t=3535 - Exploit | |
References | () http://www.neosecurityteam.net/index.php?action=advisories&id=19 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/426764/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16964 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/0823 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25048 - |
Information
Published : 2006-03-09 13:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1105
Mitre link : CVE-2006-1105
CVE.ORG link : CVE-2006-1105
JSON object : View
Products Affected
pixelpost
- pixelpost
CWE