Vulnerability CVE-2006-3938


Published: 2006-07-31   Modified: 2012-02-12

Description:
DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.

See advisories in our WLB2 database:
Topic
Author
Date
Low
DotClear : Multiples Full Path Disclosure
Silitix gmail co...
01.08.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Dotclear -> Dotclear 

 References:
http://securityreason.com/securityalert/1307
http://www.securityfocus.com/archive/1/440874/100/100/threaded
http://www.securityfocus.com/archive/1/459820/100/0/threaded
http://zone14.free.fr/advisories/8/
https://exchange.xforce.ibmcloud.com/vulnerabilities/27913

Copyright 2024, cxsecurity.com

 

Back to Top