The faq section in PostNuke 0.764 allows remote attackers to obtain sensitive information (the full path) via "unvalidated output" in FAQ/index.php, possibly involving an undefined id_cat variable.
References
Configurations
History
21 Nov 2024, 00:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html - | |
References | () http://noc.postnuke.com/plugins/scmsvn/viewcvs.php/trunk/Historic/PostNuke7x/html/modules/?root=postnuke - | |
References | () http://noc.postnuke.com/plugins/scmsvn/viewcvs.php/trunk/Historic/PostNuke7x/html/modules/FAQ/index.php?root=postnuke&r1=20350&r2=20911 - | |
References | () http://osvdb.org/35472 - | |
References | () http://www.hackers.ir/advisories/festival.txt - |
Information
Published : 2007-01-19 23:28
Updated : 2025-04-09 00:30
NVD link : CVE-2007-0385
Mitre link : CVE-2007-0385
CVE.ORG link : CVE-2007-0385
JSON object : View
Products Affected
postnuke_software_foundation
- postnuke
CWE