PyBlosxom before 1.3.2, when running on certain webservers, allows remote attackers to read arbitrary files via an HTTP request with multiple leading / (slash) characters, which is accessed using the PATH_INFO variable.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/16641 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24730 | vdb entry |
http://www.vupen.com/english/advisories/2006/0571 | vdb entry |
http://sourceforge.net/project/shownotes.php?release_id=391800 | patch |
http://secunia.com/advisories/18858 | third party advisory patch vendor advisory |