SAXON 5.4, with display_errors enabled, allows remote attackers to obtain sensitive information via (1) a direct request for news.php, (2) an invalid use of a newsid array parameter to admin/edit-item.php, and possibly unspecified vectors related to additional scripts in (3) admin/, (4) rss/, and (5) the root directory of the installation, which reveal the path in various error messages.
References
Configurations
Information
Published : 2007-10-30 14:46
Updated : 2018-10-15 14:38
NVD link : CVE-2007-4861
Mitre link : CVE-2007-4861
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
quirm
- saxon