CVE-2012-4256

The jNews (com_jnews) component 7.5.1 for Joomla! allows remote attackers to obtain sensitive information via the emailsearch parameter, which reveals the installation path in an error message.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:joobi:com_jnews:7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:42

Type Values Removed Values Added
References () http://hauntit.blogspot.com/2012/04/en-jnews-jnewscore751-information.html - Exploit () http://hauntit.blogspot.com/2012/04/en-jnews-jnewscore751-information.html - Exploit
References () http://packetstormsecurity.org/files/112233/jNews-7.5.1-Information-Disclosure.html - Exploit () http://packetstormsecurity.org/files/112233/jNews-7.5.1-Information-Disclosure.html - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/75198 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/75198 -

Information

Published : 2012-08-13 18:55

Updated : 2024-11-21 01:42


NVD link : CVE-2012-4256

Mitre link : CVE-2012-4256

CVE.ORG link : CVE-2012-4256


JSON object : View

Products Affected

joobi

  • com_jnews

joomla

  • joomla\!
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor