Justice Guestbook 1.3 allows remote attackers to obtain the full installation path via a direct request to cfooter.php3, which leaks the path in an error message.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://secunia.com/advisories/8475 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/7234 | vdb entry exploit |
http://www.securityfocus.com/archive/1/316745/30/25280/threaded | mailing list |
http://www.securitytracker.com/id?1006412 | vdb entry exploit |
http://securityreason.com/securityalert/3347 | third party advisory exploit |