GSD-2006-3938
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2006-3938",
"description": "DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.",
"id": "GSD-2006-3938"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2006-3938"
],
"details": "DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.",
"id": "GSD-2006-3938",
"modified": "2023-12-13T01:19:57.353044Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3938",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070211 DotClear Full Path Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/459820/100/0/threaded"
},
{
"name": "29814",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29814"
},
{
"name": "29828",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29828"
},
{
"name": "29825",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29825"
},
{
"name": "29816",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29816"
},
{
"name": "29826",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29826"
},
{
"name": "29817",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29817"
},
{
"name": "29815",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29815"
},
{
"name": "29818",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29818"
},
{
"name": "29812",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29812"
},
{
"name": "dotclear-multiple-path-disclosure(27913)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27913"
},
{
"name": "1307",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1307"
},
{
"name": "29830",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29830"
},
{
"name": "29821",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29821"
},
{
"name": "29827",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29827"
},
{
"name": "29831",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29831"
},
{
"name": "29820",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29820"
},
{
"name": "29829",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29829"
},
{
"name": "http://zone14.free.fr/advisories/8/",
"refsource": "MISC",
"url": "http://zone14.free.fr/advisories/8/"
},
{
"name": "29823",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29823"
},
{
"name": "29813",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29813"
},
{
"name": "29824",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29824"
},
{
"name": "29822",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29822"
},
{
"name": "20060722 DotClear : Multiples Full Path Disclosure",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/440874/100/100/threaded"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:dotclear:dotclear:1.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:dotclear:dotclear:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:dotclear:dotclear:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:dotclear:dotclear:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3938"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "29812",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29812"
},
{
"name": "29813",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29813"
},
{
"name": "29814",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29814"
},
{
"name": "29815",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29815"
},
{
"name": "29816",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29816"
},
{
"name": "29817",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29817"
},
{
"name": "29818",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29818"
},
{
"name": "29820",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29820"
},
{
"name": "29821",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29821"
},
{
"name": "29822",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29822"
},
{
"name": "29823",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29823"
},
{
"name": "29824",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29824"
},
{
"name": "29825",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29825"
},
{
"name": "29826",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29826"
},
{
"name": "29827",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29827"
},
{
"name": "29828",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29828"
},
{
"name": "29829",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29829"
},
{
"name": "29830",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29830"
},
{
"name": "29831",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/29831"
},
{
"name": "http://zone14.free.fr/advisories/8/",
"refsource": "MISC",
"tags": [],
"url": "http://zone14.free.fr/advisories/8/"
},
{
"name": "1307",
"refsource": "SREASON",
"tags": [],
"url": "http://securityreason.com/securityalert/1307"
},
{
"name": "dotclear-multiple-path-disclosure(27913)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27913"
},
{
"name": "20070211 DotClear Full Path Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/459820/100/0/threaded"
},
{
"name": "20060722 DotClear : Multiples Full Path Disclosure",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/440874/100/100/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-17T21:32Z",
"publishedDate": "2006-07-31T22:04Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…