MyBB 1.2.4 allows remote attackers to obtain sensitive information via the (1) action[] parameter to member.php, (2) imagehash[] parameter to captcha.php, and (3) a direct request to inc/datahandlers/event.php, which reveal the installation path in the resulting error message.
Link | Tags |
---|---|
http://www.osvdb.org/34155 | vdb entry |
http://www.securityfocus.com/archive/1/468549/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34336 | vdb entry |
http://osvdb.org/35549 | vdb entry |
http://osvdb.org/35548 | vdb entry |
http://marc.info/?l=full-disclosure&m=117909973216181&w=2 | mailing list exploit vendor advisory |
http://www.netvigilance.com/advisory0017 | exploit vendor advisory |