PostNuke 0.7.2.6 allows remote attackers to gain information via a direct HTTP request to files in the (1) includes/blocks directory, (2) pnadodb directory, (3) NS-NewUser module, (4) NS-Your_Account, (5) NS-LostPassword module, or (6) NS-User module which reveals the path to the web server in a PHP error message.
References
Link | Resource |
---|---|
http://www.waraxe.us/index.php?modname=sa&id=22 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/10191 | Exploit Vendor Advisory |
http://marc.info/?l=bugtraq&m=108258902000472&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15933 |
Configurations
Information
Published : 2004-04-20 21:00
Updated : 2017-07-10 18:31
NVD link : CVE-2004-1956
Mitre link : CVE-2004-1956
JSON object : View
CWE
Products Affected
postnuke_software_foundation
- postnuke