Zorum 3.5 allows remote attackers to obtain the full installation path via direct requests to (1) gorum/notification.php, (2) user.php, (3) attach.php, (4) blacklist.php, (5) zorum/forum.php, (6) globalstat.php, (7) gorum/trace.php, (8) gorum/badwords.php, or (9) gorum/flood.php.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/21914 | vdb entry |
http://rgod.altervista.org/zorum.html | vendor advisory exploit |
http://securitytracker.com/id?1014725 | vendor advisory vdb entry exploit |
http://marc.info/?l=bugtraq&m=112438781604862&w=2 | mailing list |