Description
PHP-Nuke 7.6 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) ipban.php, (2) db.php, (3) lang-norwegian.php, (4) lang-indonesian.php, (5) lang-greek.php, (6) a request to Web_Links with the portuguese language (lang-portuguese.php), (7) a request to Web_Links with the indonesian language (lang-indonesian.php), (8) a request to the survey module with the indonesian language (lang-indonesian.php), (9) a request to the Reviews module with the portuguese language, or (10) a request to the Journal module with the portuguese language, which reveal the path in an error message.
Product(s):
- Francisco Burzi PHP-Nuke 6.0
- Francisco Burzi PHP-Nuke 6.5
- Francisco Burzi PHP-Nuke 6.5 Beta 1
- Francisco Burzi PHP-Nuke 6.5 Final
- Francisco Burzi PHP-Nuke 6.5 RC1
- Francisco Burzi PHP-Nuke 6.5 RC2
- Francisco Burzi PHP-Nuke 6.5 RC3
- Francisco Burzi PHP-Nuke 6.6
- Francisco Burzi PHP-Nuke 6.7
- Francisco Burzi PHP-Nuke 6.9
- Francisco Burzi PHP-Nuke 7.0
- Francisco Burzi PHP-Nuke 7.0 Final
- Francisco Burzi PHP-Nuke 7.1
- Francisco Burzi PHP-Nuke 7.2
- Francisco Burzi PHP-Nuke 7.3
- Francisco Burzi PHP-Nuke 7.4
- Francisco Burzi PHP-Nuke 7.5
- Francisco Burzi PHP-Nuke 7.6
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-1386, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-1386 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.