Lebisoft Ziyaretci Defteri 7.4 and 7.5 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for db/lebisoft.mdb.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.exploit-db.com/exploits/11015 | exploit |
http://secunia.com/advisories/38039 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55452 | vdb entry |