Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to gain sensitive information via a direct request to (1) banner_click.php, (2) categorize.php, (3) tiki-admin_include_directory.php, (4) tiki-directory_search.php, which reveal the web server path in an error message.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/10100 | patch vendor advisory vdb entry exploit |
http://marc.info/?l=bugtraq&m=108180073206947&w=2 | mailing list |
http://secunia.com/advisories/11344 | third party advisory vendor advisory |
http://tikiwiki.org/tiki-read_article.php?articleId=66 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15847 | vdb entry |