CVE-2011-3696

60cycleCMS 2.5.2 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by post.php and certain other files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:60cyclecms_project:60cyclecms:2.5.2:*:*:*:*:*:*:*

History

25 Aug 2021, 20:30

Type Values Removed Values Added
CPE cpe:2.3:a:60cycle:60cyclecms:2.5.2:*:*:*:*:*:*:* cpe:2.3:a:60cyclecms_project:60cyclecms:2.5.2:*:*:*:*:*:*:*
References (MISC) http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/60cycleCMS.2.5.2 - Exploit (MISC) http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/60cycleCMS.2.5.2 - Exploit, Third Party Advisory
References (MISC) http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README - (MISC) http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2011/06/27/6 - (MLIST) http://www.openwall.com/lists/oss-security/2011/06/27/6 - Mailing List, Third Party Advisory

Information

Published : 2011-09-23 23:55

Updated : 2024-02-04 17:54


NVD link : CVE-2011-3696

Mitre link : CVE-2011-3696

CVE.ORG link : CVE-2011-3696


JSON object : View

Products Affected

60cyclecms_project

  • 60cyclecms
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor