CMS Chainuk 1.2 and earlier allows remote attackers to obtain sensitive information via (1) a crafted id parameter to index.php or (2) a nonexistent folder name in the id parameter to admin/admin_delete.php, which reveals the installation path in an error message.
References
Link | Resource |
---|---|
http://osvdb.org/55670 | Exploit |
http://osvdb.org/55671 | Exploit |
http://www.exploit-db.com/exploits/9069 | |
http://osvdb.org/55670 | Exploit |
http://osvdb.org/55671 | Exploit |
http://www.exploit-db.com/exploits/9069 |
Configurations
History
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/55670 - Exploit | |
References | () http://osvdb.org/55671 - Exploit | |
References | () http://www.exploit-db.com/exploits/9069 - |
Information
Published : 2009-07-05 16:30
Updated : 2024-11-21 01:04
NVD link : CVE-2009-2332
Mitre link : CVE-2009-2332
CVE.ORG link : CVE-2009-2332
JSON object : View
Products Affected
cms.tut.su
- cms_chainuk
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor