Joomla! 1.5.0 Beta allows remote attackers to obtain sensitive information via a direct request for (1) plugins/user/example.php; (2) gmail.php, (3) example.php, or (4) ldap.php in plugins/authentication/; (5) modules/mod_mainmenu/menu.php; or other unspecified PHP scripts, which reveals the path in various error messages, related to a jimport function call at the beginning of each script.
Link | Tags |
---|---|
http://osvdb.org/32522 | vdb entry |
http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html | mailing list exploit vendor advisory |
http://osvdb.org/32526 | vdb entry |
http://osvdb.org/32525 | vdb entry |
http://www.securityfocus.com/archive/1/459203/100/0/threaded | mailing list |
http://osvdb.org/32523 | vdb entry |
http://osvdb.org/32524 | vdb entry |
http://www.hackers.ir/advisories/festival.txt | vendor advisory |