The SmarterTools SmarterStats 6.0 web server allows remote attackers to obtain directory listings via a direct request for the (1) Admin/, (2) Admin/Defaults/, (3) Admin/GettingStarted/, (4) Admin/Popups/, (5) App_Themes/, (6) Client/, (7) Client/Popups/, (8) Services/, (9) Temp/, (10) UserControls/, (11) UserControls/PanelBarTemplates/, (12) UserControls/Popups/, (13) aspnet_client/, or (14) aspnet_client/system_web/ directory name, or (15) certain directory names under App_Themes/Default/.
References
Configurations
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/240150 - US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/MORO-8GYQR4 - US Government Resource | |
References | () http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/67826 - |
Information
Published : 2011-05-20 22:55
Updated : 2024-11-21 01:27
NVD link : CVE-2011-2156
Mitre link : CVE-2011-2156
CVE.ORG link : CVE-2011-2156
JSON object : View
Products Affected
smartertools
- smarterstats
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor