Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wfq8-wvj5-jv7v

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to obtain the installation path via a direct request with a non-empty setmodules parameter, which causes an invalid append_sid function call that leaks the path in an error message.

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to obtain the installation path via a direct request with a non-empty setmodules parameter, which causes an invalid append_sid function call that leaks the path in an error message.

EPSS

Процентиль: 79%
0.01262
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to obtain the installation path via a direct request with a non-empty setmodules parameter, which causes an invalid append_sid function call that leaks the path in an error message.

nvd
больше 19 лет назад

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to obtain the installation path via a direct request with a non-empty setmodules parameter, which causes an invalid append_sid function call that leaks the path in an error message.

debian
больше 19 лет назад

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to ob ...

EPSS

Процентиль: 79%
0.01262
Низкий