Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9gff-q82g-327q

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The default configuration of DCShop 1.002 beta places sensitive files in the cgi-bin directory, which could allow remote attackers to read sensitive data via an HTTP GET request for (1) orders.txt or (2) auth_user_file.txt.

The default configuration of DCShop 1.002 beta places sensitive files in the cgi-bin directory, which could allow remote attackers to read sensitive data via an HTTP GET request for (1) orders.txt or (2) auth_user_file.txt.

EPSS

Процентиль: 94%
0.11728
Средний

Связанные уязвимости

nvd
около 24 лет назад

The default configuration of DCShop 1.002 beta places sensitive files in the cgi-bin directory, which could allow remote attackers to read sensitive data via an HTTP GET request for (1) orders.txt or (2) auth_user_file.txt.

EPSS

Процентиль: 94%
0.11728
Средний