An issue was discovered in TitanHQ WebTitan before 5.18. It exposes a database configuration file under /include/dbconfig.ini in the web administration interface, revealing what database the web application is using.
The product makes files or directories accessible to unauthorized actors, even though they should not be.
Link | Tags |
---|---|
https://write-up.github.io/webtitan/ | third party advisory exploit |
https://www.webtitan.com/resources/product-updates/ | release notes vendor advisory |