SAXON 5.4, with display_errors enabled, allows remote attackers to obtain sensitive information via (1) a direct request for news.php, (2) an invalid use of a newsid array parameter to admin/edit-item.php, and possibly unspecified vectors related to additional scripts in (3) admin/, (4) rss/, and (5) the root directory of the installation, which reveal the path in various error messages.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://osvdb.org/45330 | vdb entry |
http://www.quirm.net/punbb/viewtopic.php?id=129 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38138 | vdb entry |
http://www.securityfocus.com/archive/1/482930/100/0/threaded | mailing list |
http://securityreason.com/securityalert/3311 | third party advisory |
http://osvdb.org/45332 | vdb entry |
http://osvdb.org/45334 | vdb entry |
http://www.netvigilance.com/advisory0053 | |
http://osvdb.org/45333 | vdb entry |
http://osvdb.org/45331 | vdb entry |