Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jgcj-5rhp-3r22

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

DCP-Portal 3.7 through 4.5 allows remote attackers to obtain the physical path of the server via (1) a direct request to add_user.php, or via an invalid new_language parameter in (2) contents.php, (3) categories.php, or (4) files.php, which leaks the path in an error message.

DCP-Portal 3.7 through 4.5 allows remote attackers to obtain the physical path of the server via (1) a direct request to add_user.php, or via an invalid new_language parameter in (2) contents.php, (3) categories.php, or (4) files.php, which leaks the path in an error message.

EPSS

Процентиль: 80%
0.01395
Низкий

Связанные уязвимости

nvd
больше 23 лет назад

DCP-Portal 3.7 through 4.5 allows remote attackers to obtain the physical path of the server via (1) a direct request to add_user.php, or via an invalid new_language parameter in (2) contents.php, (3) categories.php, or (4) files.php, which leaks the path in an error message.

EPSS

Процентиль: 80%
0.01395
Низкий