SAXON 5.4, with display_errors enabled, allows remote attackers to obtain sensitive information via (1) a direct request for news.php, (2) an invalid use of a newsid array parameter to admin/edit-item.php, and possibly unspecified vectors related to additional scripts in (3) admin/, (4) rss/, and (5) the root directory of the installation, which reveal the path in various error messages.
References
Configurations
History
No history.
Information
Published : 2007-10-30 21:46
Updated : 2024-02-28 11:01
NVD link : CVE-2007-4861
Mitre link : CVE-2007-4861
CVE.ORG link : CVE-2007-4861
JSON object : View
Products Affected
quirm
- saxon
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor