Date: Fri, 29 Jul 2011 15:59:05 -0400 (EDT) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: coley <coley@...re.org> Subject: Re: CVE-request Tribiq CMS path disclosure HTB22857 Please use CVE-2011-2727 Thanks -- JB ----- Original Message ----- > Can I get CVE-identifier for this issue? Verified that this is a valid > bug. > > Best regards, > Henri Salo > > ----- Forwarded message from advisory@...ridge.ch ----- > > Date: Thu, 3 Mar 2011 12:50:21 +0100 (CET) > From: advisory@...ridge.ch > To: bugtraq@...urityfocus.com > Subject: HTB22857: Path disclosure in Tribiq CMS > > Vulnerability ID: HTB22857 > Reference: > http://www.htbridge.ch/advisory/full_path_disclosure_in_tribiq_cms.html > Product: Tribiq CMS > Vendor: Tribal Limited ( http://tribiq.com/ ) > Vulnerable Version: 5.2.7b and probably prior versions > Vendor Notification: 17 February 2011 > Vulnerability Type: Path disclosure > Status: Fixed by Vendor > Risk level: Low > Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing > (http://www.htbridge.ch/) > > Vulnerability Details: > The vulnerability exists due to failure in the > "templatewrap/templatefoot.php", "cmsjs/plugin.js.php", > "cmsincludes/cms_plugin_api_link.inc.php" scripts, it's possible to > generate an error that will reveal the full path of the script. > A remote user can determine the full path to the web root directory > and other potentially sensitive information. > > > http://host/templatewrap/templatefoot.php > http://host/cmsjs/plugin.js.php > http://host/cmsincludes/cms_plugin_api_link.inc.php > > Solution: Upgrade to the most recent version > > > ----- End forwarded message -----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.