ASPRunner 2.4 stores the database under the web root in the db directory, which may allow remote attackers to obtain the database via a direct request to the database filename, which is predictable based on table and field names.
Link | Tags |
---|---|
http://www.osvdb.org/8253 | vdb entry |
http://ferruh.mavituna.com/article/?574 | exploit |
http://secunia.com/advisories/12164 | third party advisory |
http://marc.info/?l=bugtraq&m=109086977330418&w=2 | mailing list |
http://securitytracker.com/id?1010777 | vdb entry |
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0011.html | mailing list exploit |
http://www.securityfocus.com/bid/10799 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16802 | vdb entry |