Geeklog 1.4.0sr2 and earlier allows remote attackers to obtain the full installation path via a direct request and possibly invalid arguments to (1) layout/professional/functions.php or (2) getimage.php.
References
Link | Resource |
---|---|
http://kapda.ir/advisory-336.html | Exploit Vendor Advisory |
http://www.geeklog.net/index.php?topic=Security | Patch |
http://www.securityfocus.com/bid/18154 | Exploit Patch |
http://secunia.com/advisories/20316 | Exploit Patch Vendor Advisory |
http://securityreason.com/securityalert/993 | |
http://www.vupen.com/english/advisories/2006/2050 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26864 | |
http://www.securityfocus.com/archive/1/435295/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-05-31 03:06
Updated : 2018-10-18 09:41
NVD link : CVE-2006-2698
Mitre link : CVE-2006-2698
JSON object : View
CWE
Products Affected
geeklog
- geeklog