The Register Plus plugin 3.5.1 and earlier for WordPress allows remote attackers to obtain sensitive information via a direct request to (1) dash_widget.php and (2) register-plus.php, which reveals the installation path in an error message.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://websecurity.com.ua/4539 | exploit |
http://packetstormsecurity.org/files/view/96143/registerplus-xss.txt | exploit |
http://www.securityfocus.com/archive/1/514903/100/0/threaded | mailing list |