Joomla! 1.5.0 Beta allows remote attackers to obtain sensitive information via a direct request for (1) plugins/user/example.php; (2) gmail.php, (3) example.php, or (4) ldap.php in plugins/authentication/; (5) modules/mod_mainmenu/menu.php; or other unspecified PHP scripts, which reveals the path in various error messages, related to a jimport function call at the beginning of each script.
References
Configurations
History
21 Nov 2024, 00:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html - Exploit, Vendor Advisory | |
References | () http://osvdb.org/32522 - | |
References | () http://osvdb.org/32523 - | |
References | () http://osvdb.org/32524 - | |
References | () http://osvdb.org/32525 - | |
References | () http://osvdb.org/32526 - | |
References | () http://www.hackers.ir/advisories/festival.txt - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/459203/100/0/threaded - |
Information
Published : 2007-01-19 23:28
Updated : 2024-11-21 00:25
NVD link : CVE-2007-0375
Mitre link : CVE-2007-0375
CVE.ORG link : CVE-2007-0375
JSON object : View
Products Affected
joomla
- joomla
CWE