Vulnerabilities > CVE-2005-0310 - Information Disclosure vulnerability in Exponent 0.95
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Exponent 0.95 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) search.info.php, (2) permissions.info.php, (3) security.info.php, (4) formcontrol.php, or (5) file_modules.php, which reveals the path in an error message because the pathos_core_version variable is undefined.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | EXPONENT_MULTIPLE.NASL |
description | The remote host is running Exponent, a web-based content management system implemented in PHP. Directly requesting several different pages reveals the absolute path where Exponent is installed. A remote attacker could use this information to mount further attacks. In addition, the installed version is likely to be affected to multiple cross-site scripting vulnerabilities, although Nessus has not checked for them. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16250 |
published | 2005-01-25 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16250 |
title | Exponent CMS Multiple Script pathos_core_version Parameter Path Disclosure |
code |
|