GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via a direct request to (1) data/users/<username>.xml, (2) backups/users/<username>.xml.bak, (3) data/other/authorization.xml, or (4) data/other/appid.xml.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://rossmarks.uk/whitepapers/getSimple_cms_3.3.4.txt | third party advisory exploit |
http://rossmarks.uk/portfolio.php | third party advisory |
http://packetstormsecurity.com/files/162906/GetSimple-CMS-3.3.4-Information-Disclosure.html |