Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j5rv-6xpg-vcc4

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

CMS Chainuk 1.2 and earlier allows remote attackers to obtain sensitive information via (1) a crafted id parameter to index.php or (2) a nonexistent folder name in the id parameter to admin/admin_delete.php, which reveals the installation path in an error message.

CMS Chainuk 1.2 and earlier allows remote attackers to obtain sensitive information via (1) a crafted id parameter to index.php or (2) a nonexistent folder name in the id parameter to admin/admin_delete.php, which reveals the installation path in an error message.

EPSS

Процентиль: 88%
0.04003
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
больше 16 лет назад

CMS Chainuk 1.2 and earlier allows remote attackers to obtain sensitive information via (1) a crafted id parameter to index.php or (2) a nonexistent folder name in the id parameter to admin/admin_delete.php, which reveals the installation path in an error message.

EPSS

Процентиль: 88%
0.04003
Низкий

Дефекты

CWE-200