DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/archive/1/459820/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.osvdb.org/29814 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29828 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29825 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29816 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29826 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29817 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29815 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29818 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29812 | vdb-entry x_refsource_OSVDB x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27913 | vdb-entry x_refsource_XF x_transferred |
http://securityreason.com/securityalert/1307 | third-party-advisory x_refsource_SREASON x_transferred |
http://www.osvdb.org/29830 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29821 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29827 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29831 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29820 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29829 | vdb-entry x_refsource_OSVDB x_transferred |
http://zone14.free.fr/advisories/8/ | x_refsource_MISC x_transferred |
http://www.osvdb.org/29823 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29813 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29824 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/29822 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.securityfocus.com/archive/1/440874/100/100/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |