monitor/index.php in op5 Monitor and op5 Appliance before 5.5.1 allows remote authenticated users to obtain sensitive information such as database and user credentials via error messages that are triggered by (1) a malformed hoststatustypes parameter to status/service/all or (2) a crafted request to config.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2012/Jan/62 - | |
References | () http://secunia.com/advisories/47344 - Vendor Advisory | |
References | () http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf - Exploit | |
References | () http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/ - | |
References | () http://www.osvdb.org/78067 - | |
References | () https://bugs.op5.com/view.php?id=5094 - |
Information
Published : 2013-12-31 20:55
Updated : 2024-11-21 01:34
NVD link : CVE-2012-0263
Mitre link : CVE-2012-0263
CVE.ORG link : CVE-2012-0263
JSON object : View
Products Affected
op5
- monitor
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor