Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5488-2xmq-hwfh

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Moodle 2.0.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by webservice/xmlrpc/locallib.php and certain other files.

Moodle 2.0.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by webservice/xmlrpc/locallib.php and certain other files.

EPSS

Процентиль: 49%
0.0026
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
почти 14 лет назад

Moodle 2.0.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by webservice/xmlrpc/locallib.php and certain other files.

nvd
почти 14 лет назад

Moodle 2.0.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by webservice/xmlrpc/locallib.php and certain other files.

EPSS

Процентиль: 49%
0.0026
Низкий

Дефекты

CWE-200