lib/functions/database.class.php in TestLink before 1.9.13 allows remote attackers to obtain sensitive information via unspecified vectors, which reveals the installation path in an error message.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2014/Oct/106 | mailing list exploit patch |
http://packetstormsecurity.com/files/128824/TestLink-1.9.12-Path-Disclosure.html | patch exploit |
http://karmainsecurity.com/KIS-2014-12 | patch exploit |
http://www.securityfocus.com/archive/1/533799/100/0/threaded | mailing list |
http://mantis.testlink.org/view.php?id=6651 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/97728 | vdb entry |
http://www.securityfocus.com/bid/70713 | vdb entry |
https://gitorious.org/testlink-ga/testlink-code/commit/c943e7a397f03e1f60b096c7e6eb94fdefd8a569 |