Jetbox CMS 2.1 allows remote attackers to obtain sensitive information via (1) a direct request to (a) main_page.php, (b) open_tree.php, and (c) outputs.php; (2) a malformed view parameter to index.php, as demonstrated with an SQL injection manipulation; or (3) the id[] parameter to admin/cms/opentree.php, which reveals the installation path in the resulting error message.
Link | Tags |
---|---|
http://osvdb.org/34789 | vdb entry |
http://osvdb.org/34790 | vdb entry |
http://www.netvigilance.com/advisory0027 | vendor advisory exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34385 | vdb entry |
http://osvdb.org/34788 | vdb entry |
http://marc.info/?l=full-disclosure&m=117974375029054&w=2 | vendor advisory mailing list exploit |
http://www.securityfocus.com/archive/1/469222/100/0/threaded | mailing list |
http://osvdb.org/34787 | vdb entry |
http://www.osvdb.org/34783 | vdb entry |