The file server in ActivePost Standard 3.1 and earlier allows remote authenticated users to obtain sensitive information by uploading a file, which reveals the path in a success message.
                
            References
                    | Link | Resource | 
|---|---|
| http://aluigi.altervista.org/adv/actp-adv.txt | Exploit Vendor Advisory | 
| http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0852.html | Exploit Vendor Advisory | 
| http://marc.info/?l=bugtraq&%3Bm=109597139011373&%3Bw=2 | |
| http://securitytracker.com/id?1011406 | Exploit Vendor Advisory | 
| http://www.osvdb.org/10235 | |
| http://aluigi.altervista.org/adv/actp-adv.txt | Exploit Vendor Advisory | 
| http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0852.html | Exploit Vendor Advisory | 
| http://marc.info/?l=bugtraq&%3Bm=109597139011373&%3Bw=2 | |
| http://securitytracker.com/id?1011406 | Exploit Vendor Advisory | 
| http://www.osvdb.org/10235 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    20 Nov 2024, 23:53
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://aluigi.altervista.org/adv/actp-adv.txt - Exploit, Vendor Advisory | |
| References | () http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0852.html - Exploit, Vendor Advisory | |
| References | () http://marc.info/?l=bugtraq&%3Bm=109597139011373&%3Bw=2 - | |
| References | () http://securitytracker.com/id?1011406 - Exploit, Vendor Advisory | |
| References | () http://www.osvdb.org/10235 - | 
07 Nov 2023, 01:57
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
 | 
Information
                Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-2616
Mitre link : CVE-2004-2616
CVE.ORG link : CVE-2004-2616
JSON object : View
Products Affected
                onnuri_infotek
- activepost_standard
CWE
                