Описание
DCP-Portal 3.7 through 4.5 allows remote attackers to obtain the physical path of the server via (1) a direct request to add_user.php, or via an invalid new_language parameter in (2) contents.php, (3) categories.php, or (4) files.php, which leaks the path in an error message.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:codeworx_technologies:dcp-portal:3.7:*:*:*:*:*:*:*
cpe:2.3:a:codeworx_technologies:dcp-portal:4.0:*:*:*:*:*:*:*
cpe:2.3:a:codeworx_technologies:dcp-portal:4.1:*:*:*:*:*:*:*
cpe:2.3:a:codeworx_technologies:dcp-portal:4.2:*:*:*:*:*:*:*
cpe:2.3:a:codeworx_technologies:dcp-portal:4.5:*:*:*:*:*:*:*
EPSS
Процентиль: 80%
0.01395
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
DCP-Portal 3.7 through 4.5 allows remote attackers to obtain the physical path of the server via (1) a direct request to add_user.php, or via an invalid new_language parameter in (2) contents.php, (3) categories.php, or (4) files.php, which leaks the path in an error message.
EPSS
Процентиль: 80%
0.01395
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other