images/captcha.php in RavenNuke 2.30 allows remote attackers to obtain sensitive information via an aFonts array parameter value that does not correspond to a valid font file, which reveals the installation path in an error message.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/48792 | vdb entry |
http://ravenphpscripts.com/postt17156.html | vendor advisory |
http://www.securityfocus.com/archive/1/500988/100/0/threaded | mailing list |
https://www.exploit-db.com/exploits/8068 | exploit |
http://www.waraxe.us/advisory-72.html | exploit |