PhpMyFaq 1.5.1 stores data files under the web document root with insufficient access control and predictable filenames, which allows remote attackers to obtain sensitive information via a direct request to the data/tracking[DATE] file.
Link | Tags |
---|---|
http://secunia.com/advisories/16933 | third party advisory |
http://www.securityfocus.com/bid/14930 | vdb entry |
http://www.osvdb.org/19670 | vdb entry |
http://rgod.altervista.org/phpmyfuck151.html | exploit vendor advisory |
http://marc.info/?l=bugtraq&m=112749230124091&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22405 | vdb entry |
http://securitytracker.com/id?1014968 | vdb entry |