phpAdsNew and phpPgAds 2.0.6 and possibly earlier versions allows remote attackers to obtain the application installation path and other sensitive information via direct requests to (1) create.php, and if display_errors is enabled, (2) lib-updates.inc.php, (3) lib-targetstats.inc.php, (4) lib-size.inc.php, (5) lib-misc-stats.inc.php, (6) lib-hourly-hosts.inc.php, (7) lib-hourly.inc.php, (8) lib-history.inc.php, and (9) graph-daily.php.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.fitsec.com/advisories/FS-05-01.txt | vendor advisory |
http://www.osvdb.org/20740 | vdb entry |
http://www.osvdb.org/20743 | vdb entry |
http://marc.info/?l=bugtraq&m=113165036315035&w=2 | mailing list |
http://www.osvdb.org/20737 | vdb entry |
http://secunia.com/advisories/17464/ | patch vendor advisory third party advisory |
http://sourceforge.net/project/shownotes.php?group_id=36679&release_id=370942 | |
http://www.osvdb.org/20739 | vdb entry |
http://www.osvdb.org/20735 | vdb entry |
http://seclists.org/lists/bugtraq/2005/Nov/0189.html | mailing list |
http://securityreason.com/securityalert/171 | third party advisory |
http://www.osvdb.org/20738 | vdb entry |
http://www.osvdb.org/20741 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/23043 | vdb entry |
http://www.vupen.com/english/advisories/2005/2380 | vdb entry vendor advisory |
http://www.osvdb.org/20742 | vdb entry |
http://www.osvdb.org/20736 | vdb entry |