Docebo 3.5.0.3 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) class/class.conf_fw.php, (2) class.module/class.event_manager.php, (3) lib/lib.domxml5.php, or (4) menu/menu_over.php in doceboCore/; or (5) class/class.conf_cms.php, (6) lib/lib.compose.php, (7) modules/chat/teleskill.php, or (8) class/class.admin_menu_cms.php in doceboCms/; which reveals the installation path in an error message.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/27211 | Exploit |
http://www.docebo.org/doceboCms/bugtracker/18_124/bugdetails/appid_24-bugid_198/bugtracker.html | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/4879 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2009-09-02 10:30
Updated : 2017-09-28 18:33
NVD link : CVE-2008-7154
Mitre link : CVE-2008-7154
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
docebo
- docebo