KrM Haber 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for d_atabase/Krmdb.mdb.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/39700 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/58284 | vdb entry |
http://packetstormsecurity.org/1004-exploits/krmhaber-disclose.txt | exploit |
http://osvdb.org/64217 | vdb entry |