core/model/MySQLDatabase.php in SilverStripe 2.4.x before 2.4.4, when the site is running in "live mode," allows remote attackers to obtain the SQL queries for a page via the showqueries and ajax parameters.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/05/01/3 | mailing list |
http://secunia.com/advisories/42346 | third party advisory vendor advisory |
http://www.osvdb.org/69885 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/04/30/1 | mailing list |
http://www.openwall.com/lists/oss-security/2012/04/30/3 | mailing list |
http://www.openwall.com/lists/oss-security/2011/01/03/12 | mailing list |
http://doc.silverstripe.org/framework/en/trunk/changelogs//2.4.4 | vendor advisory |
http://open.silverstripe.org/changeset/114783 | patch exploit |