GHSA-68X3-76P3-3CJC

Vulnerability from github – Published: 2022-05-01 07:13 – Updated: 2025-04-03 04:37
VLAI?
Details

DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.

Show details on source website

{
  "affected": [],
  "aliases": [
    "CVE-2006-3938"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2006-07-31T22:04:00Z",
    "severity": "MODERATE"
  },
  "details": "DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.",
  "id": "GHSA-68x3-76p3-3cjc",
  "modified": "2025-04-03T04:37:42Z",
  "published": "2022-05-01T07:13:46Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3938"
    },
    {
      "type": "WEB",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27913"
    },
    {
      "type": "WEB",
      "url": "http://securityreason.com/securityalert/1307"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29812"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29813"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29814"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29815"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29816"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29817"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29818"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29820"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29821"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29822"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29823"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29824"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29825"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29826"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29827"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29828"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29829"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29830"
    },
    {
      "type": "WEB",
      "url": "http://www.osvdb.org/29831"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/archive/1/440874/100/100/threaded"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/archive/1/459820/100/0/threaded"
    },
    {
      "type": "WEB",
      "url": "http://zone14.free.fr/advisories/8"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…