Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-4358

Опубликовано: 20 дек. 2005
Источник: debian
EPSS Низкий

Описание

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to obtain the installation path via a direct request with a non-empty setmodules parameter, which causes an invalid append_sid function call that leaks the path in an error message.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
phpbb2unfixedpackage

EPSS

Процентиль: 79%
0.01262
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to obtain the installation path via a direct request with a non-empty setmodules parameter, which causes an invalid append_sid function call that leaks the path in an error message.

nvd
больше 19 лет назад

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to obtain the installation path via a direct request with a non-empty setmodules parameter, which causes an invalid append_sid function call that leaks the path in an error message.

github
больше 3 лет назад

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to obtain the installation path via a direct request with a non-empty setmodules parameter, which causes an invalid append_sid function call that leaks the path in an error message.

EPSS

Процентиль: 79%
0.01262
Низкий