Cahier de texte 2.0 stores sensitive information under the web root, possibly with insufficient access control, which might allow remote attackers to obtain all users' passwords via a direct request for administration/dump.sql.
Link | Tags |
---|---|
http://acid-root.new.fr/poc/15061124.txt | exploit |
http://securityreason.com/securityalert/1961 | third party advisory |
http://www.vupen.com/english/advisories/2006/4701 | vdb entry |
http://secunia.com/advisories/23122 | exploit third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/452600/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/21283 | vdb entry |