download.aspx in Douran Portal 3.9.7.8 allows remote attackers to obtain source code of arbitrary files under the web root via (1) a trailing ".", (2) a trailing space, or (3) mixed case in the FileNameAttach parameter.
References
Configurations
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/71250 - | |
References | () http://secunia.com/advisories/43792 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/8180 - | |
References | () http://soroush.secproject.com/blog/2011/01/unrestricted_file_download_v1_0/ - | |
References | () http://www.exploit-db.com/exploits/17011 - Exploit | |
References | () http://www.securityfocus.com/archive/1/517085/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/46927 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/66177 - |
Information
Published : 2011-04-05 15:19
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1569
Mitre link : CVE-2011-1569
CVE.ORG link : CVE-2011-1569
JSON object : View
Products Affected
douran
- portal
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor