The SmarterTools SmarterStats 6.0 web server allows remote attackers to obtain directory listings via a direct request for the (1) Admin/, (2) Admin/Defaults/, (3) Admin/GettingStarted/, (4) Admin/Popups/, (5) App_Themes/, (6) Client/, (7) Client/Popups/, (8) Services/, (9) Temp/, (10) UserControls/, (11) UserControls/PanelBarTemplates/, (12) UserControls/Popups/, (13) aspnet_client/, or (14) aspnet_client/system_web/ directory name, or (15) certain directory names under App_Themes/Default/.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/240150 | US Government Resource |
http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html | |
http://www.kb.cert.org/vuls/id/MORO-8GYQR4 | US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67826 |
Configurations
Information
Published : 2011-05-20 15:55
Updated : 2017-08-28 18:29
NVD link : CVE-2011-2156
Mitre link : CVE-2011-2156
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
smartertools
- smarterstats