PHP-Fusion 5.0 and 6.0 stores the database file with a predictable filename under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to the filename in the administration/db_backups directory in PHP-Fusion 6.0 or the fusion_admin/db_backups directory in 5.0.
References
Link | Resource |
---|---|
http://dark-assassins.com/forum/viewtopic.php?t=142 | Exploit URL Repurposed |
http://secunia.com/advisories/15830 | Patch Vendor Advisory |
http://www.vupen.com/english/advisories/2005/0888 | |
http://dark-assassins.com/forum/viewtopic.php?t=142 | Exploit URL Repurposed |
http://secunia.com/advisories/15830 | Patch Vendor Advisory |
http://www.vupen.com/english/advisories/2005/0888 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://dark-assassins.com/forum/viewtopic.php?t=142 - Exploit, URL Repurposed | |
References | () http://secunia.com/advisories/15830 - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2005/0888 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://dark-assassins.com/forum/viewtopic.php?t=142 - Exploit, URL Repurposed |
Information
Published : 2005-06-29 04:00
Updated : 2024-11-20 23:58
NVD link : CVE-2005-2075
Mitre link : CVE-2005-2075
CVE.ORG link : CVE-2005-2075
JSON object : View
Products Affected
php_fusion
- php_fusion
CWE