Cahier de texte 2.0 stores sensitive information under the web root, possibly with insufficient access control, which might allow remote attackers to obtain all users' passwords via a direct request for administration/dump.sql.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://acid-root.new.fr/poc/15061124.txt - Exploit | |
References | () http://secunia.com/advisories/23122 - Exploit, Vendor Advisory | |
References | () http://securityreason.com/securityalert/1961 - | |
References | () http://www.securityfocus.com/archive/1/452600/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21283 - | |
References | () http://www.vupen.com/english/advisories/2006/4701 - |
Information
Published : 2006-12-04 11:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6253
Mitre link : CVE-2006-6253
CVE.ORG link : CVE-2006-6253
JSON object : View
Products Affected
cahier_de_textes
- cahier_de_textes
CWE