Headstart Solutions DeskPRO stores sensitive information under the web root with insufficient access control, which allows remote attackers to (1) list files in the includes/ directory; obtain the SQL username and password via a direct request for (2) config.php and (3) config.php.bak in includes/; read files in (4) email/, (5) admin/graphs/, (6) includes/javascript/, and (7) certain other includes/ directories via direct requests; and download SQL database data via direct requests for (8) data.sql, (9) install.sql, (10) settings.sql, and possibly other files in install/v2data/.
References
Link | Resource |
---|---|
http://www.zion-security.com/text/Mul_Vulnerability_DeskPro.txt | Exploit Vendor Advisory |
http://www.zion-security.com/text/Mul_Vulnerability_DeskPro.txt | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.zion-security.com/text/Mul_Vulnerability_DeskPro.txt - Exploit, Vendor Advisory |
Information
Published : 2007-02-07 20:28
Updated : 2024-11-21 00:24
NVD link : CVE-2006-6974
Mitre link : CVE-2006-6974
CVE.ORG link : CVE-2006-6974
JSON object : View
Products Affected
headstart_solutions
- deskpro
CWE