PHP-Fusion 5.0 and 6.0 stores the database file with a predictable filename under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to the filename in the administration/db_backups directory in PHP-Fusion 6.0 or the fusion_admin/db_backups directory in 5.0.
Link | Tags |
---|---|
http://secunia.com/advisories/15830 | third party advisory patch vendor advisory |
http://www.vupen.com/english/advisories/2005/0888 | vdb entry |
http://dark-assassins.com/forum/viewtopic.php?t=142 | url repurposed exploit |