The request_path function in includes/bootstrap.inc in Drupal 7.14 and earlier allows remote attackers to obtain sensitive information via the q[] parameter to index.php, which reveals the installation path in an error message.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://osvdb.org/81817 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75531 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2012-05/0053.html | mailing list exploit |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:074 | vendor advisory |
http://secunia.com/advisories/49131 | exploit third party advisory vendor advisory |
http://www.securityfocus.com/bid/53454 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2012-05/0052.html | mailing list |
http://archives.neohapsis.com/archives/bugtraq/2012-05/0055.html | mailing list |
http://www.openwall.com/lists/oss-security/2012/08/02/8 | mailing list |