Limbo CMS 1.0.4.2 and earlier allows remote attackers to obtain the installation path of the application via a direct request to (1) doc.inc.php, (2) element.inc.php, and (3) node.inc.php, which leaks the path in an error message.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://secunia.com/advisories/18063/ | third party advisory patch vendor advisory |
http://www.osvdb.org/21757 | vdb entry |
http://securitytracker.com/id?1015364 | vdb entry exploit |
http://www.osvdb.org/21758 | vdb entry |
http://rgod.altervista.org/limbo1042_xpl.html | exploit vendor advisory |
http://www.osvdb.org/21759 | vdb entry |
http://www.securityfocus.com/archive/1/419470/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2005/2932 | vdb entry vendor advisory |