MyBB 1.2.4 allows remote attackers to obtain sensitive information via the (1) action[] parameter to member.php, (2) imagehash[] parameter to captcha.php, and (3) a direct request to inc/datahandlers/event.php, which reveal the installation path in the resulting error message.
References
Configurations
History
21 Nov 2024, 00:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=full-disclosure&m=117909973216181&w=2 - Exploit, Vendor Advisory | |
References | () http://osvdb.org/35548 - | |
References | () http://osvdb.org/35549 - | |
References | () http://www.netvigilance.com/advisory0017 - Exploit, Vendor Advisory | |
References | () http://www.osvdb.org/34155 - | |
References | () http://www.securityfocus.com/archive/1/468549/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34336 - |
Information
Published : 2007-05-14 21:19
Updated : 2024-11-21 00:26
NVD link : CVE-2007-0689
Mitre link : CVE-2007-0689
CVE.ORG link : CVE-2007-0689
JSON object : View
Products Affected
mybb
- mybb
CWE