PHPChain 1.0 and earlier allows remote attackers to obtain the installation path via invalid values of the catid parameter to (1) settings.php or (2) cat.php, as demonstrated by XSS manipulations.
Link | Tags |
---|---|
http://pridels0.blogspot.com/2007/05/phpchain-vuln.html | |
http://osvdb.org/35538 | vdb entry |
http://www.vupen.com/english/advisories/2007/1647 | vdb entry |
http://www.securityfocus.com/bid/23761 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34019 | vdb entry |
http://secunia.com/advisories/25128 | third party advisory |