Pearson Education PowerSchool 4.3.6 allows remote attackers to list the contents of the admin folder via a URI composed of the admin/ directory name and an arbitrary filename ending in ".js." NOTE: it was later reported that this issue had been addressed by 5.1.2.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://osvdb.org/33741 | vdb entry |
http://securityreason.com/securityalert/2276 | third party advisory exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32569 | vdb entry |
http://www.securityfocus.com/archive/1/484569/100/200/threaded | mailing list |
http://www.securityfocus.com/bid/22611 | vdb entry exploit |
http://www.securityfocus.com/archive/1/460533/100/0/threaded | mailing list |