Описание
PHP-Fusion 5.0 and 6.0 stores the database file with a predictable filename under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to the filename in the administration/db_backups directory in PHP-Fusion 6.0 or the fusion_admin/db_backups directory in 5.0.
Ссылки
- ExploitURL Repurposed
- PatchVendor Advisory
- ExploitURL Repurposed
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:php_fusion:php_fusion:5.0:*:*:*:*:*:*:*
cpe:2.3:a:php_fusion:php_fusion:6.0:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.03447
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
PHP-Fusion 5.0 and 6.0 stores the database file with a predictable filename under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to the filename in the administration/db_backups directory in PHP-Fusion 6.0 or the fusion_admin/db_backups directory in 5.0.
EPSS
Процентиль: 87%
0.03447
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other