CVE-2005-1698
Published May 24, 2005
Last updated 10 months ago
Overview
- Description
- PostNuke 0.750 and 0.760RC3 allows remote attackers to obtain sensitive information via a direct request to (1) theme.php or (2) Xanthia.php in the Xanthia module, (3) user.php, (4) thelang.php, (5) text.php, (6) html.php, (7) menu.php, (8) finclude.php, or (9) button.php in the pnblocks directory in the Blocks module, (10) config.php in the NS-Multisites (aka Multisites) module, or (11) xmlrpc.php, which reveals the path in an error message.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-425
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:postnuke:postnuke:0.750:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "541C4426-713E-43C5-BFC2-E269640B3A6F" }, { "criteria": "cpe:2.3:a:postnuke:postnuke:0.760:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A2E27E6-2C26-4A6F-B621-C59B3822130B" } ], "operator": "OR" } ] } ]