2z project 0.9.6.1 allows remote attackers to obtain sensitive information via (1) a request to index.php with an invalid template or (2) a request to the default URI with certain year and month parameters, which reveals the path in various error messages.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/27057 | vdb entry exploit |
http://securityreason.com/securityalert/3514 | third party advisory |
http://www.securityfocus.com/archive/1/485590/100/0/threaded | mailing list |
http://2z-project.ru/forum/viewtopic.php?pid=8309 |