60cycleCMS 2.5.2 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by post.php and certain other files.
References
Link | Resource |
---|---|
http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README | Third Party Advisory |
http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/60cycleCMS.2.5.2 | Exploit Third Party Advisory |
http://www.openwall.com/lists/oss-security/2011/06/27/6 | Mailing List Third Party Advisory |
Configurations
History
25 Aug 2021, 20:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:60cyclecms_project:60cyclecms:2.5.2:*:*:*:*:*:*:* | |
References | (MISC) http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/60cycleCMS.2.5.2 - Exploit, Third Party Advisory | |
References | (MISC) http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README - Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2011/06/27/6 - Mailing List, Third Party Advisory |
Information
Published : 2011-09-23 23:55
Updated : 2024-02-04 17:54
NVD link : CVE-2011-3696
Mitre link : CVE-2011-3696
CVE.ORG link : CVE-2011-3696
JSON object : View
Products Affected
60cyclecms_project
- 60cyclecms
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor