CodeAvalanche Directory stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing the administrator password via a direct request for _private/CADirectory.mdb. NOTE: some of these details are obtained from third party information.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/33100 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47353 | vdb entry |
http://securityreason.com/securityalert/4907 | third party advisory |
https://www.exploit-db.com/exploits/7468 | exploit |