Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cfgq-q7j2-gqr3

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

RunCMS 2M1, when running with certain error_reporting levels, allows remote attackers to obtain sensitive information via (1) the op[] parameter to modules/contact/index.php or (2) uid[] parameter to userinfo.php, which leaks the installation path in an error message when these parameters are used in a call to the preg_match function.

RunCMS 2M1, when running with certain error_reporting levels, allows remote attackers to obtain sensitive information via (1) the op[] parameter to modules/contact/index.php or (2) uid[] parameter to userinfo.php, which leaks the installation path in an error message when these parameters are used in a call to the preg_match function.

EPSS

Процентиль: 48%
0.0025
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
больше 16 лет назад

RunCMS 2M1, when running with certain error_reporting levels, allows remote attackers to obtain sensitive information via (1) the op[] parameter to modules/contact/index.php or (2) uid[] parameter to userinfo.php, which leaks the installation path in an error message when these parameters are used in a call to the preg_match function.

EPSS

Процентиль: 48%
0.0025
Низкий

Дефекты

CWE-200