ViArt Shop (aka Shopping Cart) 3.5 allows remote attackers to obtain sensitive information via a URL in the POST_DATA parameter to manuals_search.php, which reveals the installation path in an error message.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.osvdb.org/53281 | vdb entry exploit |
http://www.securityfocus.com/archive/1/499625/100/0/threaded | mailing list |
http://www.securitytracker.com/id?1021497 | vdb entry exploit |
http://www.securityfocus.com/bid/33043 | vdb entry exploit |