CNR Hikaye Portal 2.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for db/hikaye.mdb.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.osvdb.org/61480 | vdb entry |
http://secunia.com/advisories/38103 | third party advisory vendor advisory |
http://packetstormsecurity.org/1001-exploits/aspcnrhikaye-disclose.txt | exploit |
http://www.vupen.com/english/advisories/2010/0032 | vdb entry vendor advisory |