TOPo 1.43 allows remote attackers to obtain sensitive information by sending an HTTP request with an invalid parameter to (1) in.php or (2) out.php, which reveals the path to the TOPo directory in the error message.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/6768 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11248 | vdb entry |
http://secunia.com/advisories/8008 | third party advisory vendor advisory |
http://archives.neohapsis.com/archives/bugtraq/2003-02/0049.html | patch mailing list |