RunCMS 2M1, when running with certain error_reporting levels, allows remote attackers to obtain sensitive information via (1) the op[] parameter to modules/contact/index.php or (2) uid[] parameter to userinfo.php, which leaks the installation path in an error message when these parameters are used in a call to the preg_match function.
References
Link | Resource |
---|---|
http://retrogod.altervista.org/9sg_runcms_forum_sql.html | Exploit |
http://retrogod.altervista.org/9sg_runcms_forum_sql.html | Exploit |
Configurations
History
21 Nov 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://retrogod.altervista.org/9sg_runcms_forum_sql.html - Exploit |
Information
Published : 2009-10-27 16:30
Updated : 2024-11-21 01:08
NVD link : CVE-2009-3815
Mitre link : CVE-2009-3815
CVE.ORG link : CVE-2009-3815
JSON object : View
Products Affected
runcms
- runcms
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor