RunCMS 2M1, when running with certain error_reporting levels, allows remote attackers to obtain sensitive information via (1) the op[] parameter to modules/contact/index.php or (2) uid[] parameter to userinfo.php, which leaks the installation path in an error message when these parameters are used in a call to the preg_match function.
References
Link | Resource |
---|---|
http://retrogod.altervista.org/9sg_runcms_forum_sql.html | Exploit |
Configurations
Information
Published : 2009-10-27 09:30
Updated : 2009-10-27 21:00
NVD link : CVE-2009-3815
Mitre link : CVE-2009-3815
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
runcms
- runcms