Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jx58-4hh4-9f7j

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

PostNuke 0.7.2.6 allows remote attackers to gain information via a direct HTTP request to files in the (1) includes/blocks directory, (2) pnadodb directory, (3) NS-NewUser module, (4) NS-Your_Account, (5) NS-LostPassword module, or (6) NS-User module which reveals the path to the web server in a PHP error message.

PostNuke 0.7.2.6 allows remote attackers to gain information via a direct HTTP request to files in the (1) includes/blocks directory, (2) pnadodb directory, (3) NS-NewUser module, (4) NS-Your_Account, (5) NS-LostPassword module, or (6) NS-User module which reveals the path to the web server in a PHP error message.

EPSS

Процентиль: 63%
0.00457
Низкий

Связанные уязвимости

nvd
почти 22 года назад

PostNuke 0.7.2.6 allows remote attackers to gain information via a direct HTTP request to files in the (1) includes/blocks directory, (2) pnadodb directory, (3) NS-NewUser module, (4) NS-Your_Account, (5) NS-LostPassword module, or (6) NS-User module which reveals the path to the web server in a PHP error message.

EPSS

Процентиль: 63%
0.00457
Низкий