The Organizer plugin 1.2.1 for WordPress allows remote attackers to obtain the installation path via unspecified vectors to (1) plugin_hook.php, (2) page/index.php, (3) page/dir.php (4) page/options.php, (5) page/resize.php, (6) page/upload.php, (7) page/users.php, or (8) page/view.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.org/files/112086/WordPress-Organizer-1.2.1-Cross-Site-Scripting-Path-Disclosure.html | Exploit Third Party Advisory VDB Entry |
http://websecurity.com.ua/5782 | Exploit Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75107 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2013-01-23 17:55
Updated : 2017-11-22 07:39
NVD link : CVE-2012-6512
Mitre link : CVE-2012-6512
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
organizer_project
- organizer