Docebo 3.5.0.3 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) class/class.conf_fw.php, (2) class.module/class.event_manager.php, (3) lib/lib.domxml5.php, or (4) menu/menu_over.php in doceboCore/; or (5) class/class.conf_cms.php, (6) lib/lib.compose.php, (7) modules/chat/teleskill.php, or (8) class/class.admin_menu_cms.php in doceboCms/; which reveals the installation path in an error message.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.docebo.org/doceboCms/bugtracker/18_124/bugdetails/appid_24-bugid_198/bugtracker.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/27211 - Exploit | |
References | () https://www.exploit-db.com/exploits/4879 - |
Information
Published : 2009-09-02 17:30
Updated : 2024-11-21 00:58
NVD link : CVE-2008-7154
Mitre link : CVE-2008-7154
CVE.ORG link : CVE-2008-7154
JSON object : View
Products Affected
docebo
- docebo
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor