SAXON 5.4, with display_errors enabled, allows remote attackers to obtain sensitive information via (1) a direct request for news.php, (2) an invalid use of a newsid array parameter to admin/edit-item.php, and possibly unspecified vectors related to additional scripts in (3) admin/, (4) rss/, and (5) the root directory of the installation, which reveal the path in various error messages.
References
Configurations
History
21 Nov 2024, 00:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/45330 - | |
References | () http://osvdb.org/45331 - | |
References | () http://osvdb.org/45332 - | |
References | () http://osvdb.org/45333 - | |
References | () http://osvdb.org/45334 - | |
References | () http://securityreason.com/securityalert/3311 - | |
References | () http://www.netvigilance.com/advisory0053 - | |
References | () http://www.quirm.net/punbb/viewtopic.php?id=129 - | |
References | () http://www.securityfocus.com/archive/1/482930/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38138 - |
Information
Published : 2007-10-30 21:46
Updated : 2024-11-21 00:36
NVD link : CVE-2007-4861
Mitre link : CVE-2007-4861
CVE.ORG link : CVE-2007-4861
JSON object : View
Products Affected
quirm
- saxon
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor