← Voltar para CVEs
CVE-2012-1614
N/ADescricao
Coppermine Photo Gallery before 1.5.20 allows remote attackers to obtain sensitive information via (1) a direct request to plugins/visiblehookpoints/index.php, an invalid (2) page or (3) cat parameter to thumbnails.php, an invalid (4) page parameter to usermgr.php, or an invalid (5) newer_than or (6) older_than parameter to search.inc.php, which reveals the installation path in an error message.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado9/4/2012
Ultima modificacao4/11/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
coppermine-gallery:coppermine_photo_gallery
Fraquezas (CWE)
CWE-200
Referencias
http://archives.neohapsis.com/archives/bugtraq/2012-03/0167.html(secalert@redhat.com)
http://coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.6.x/edit_one_pic.php?r1=8348&r2=8354(secalert@redhat.com)
http://forum.coppermine-gallery.net/index.php/topic%2C74682.0.html(secalert@redhat.com)
http://osvdb.org/80732(secalert@redhat.com)
http://osvdb.org/80733(secalert@redhat.com)
http://osvdb.org/80734(secalert@redhat.com)
http://osvdb.org/80735(secalert@redhat.com)
http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html(secalert@redhat.com)
http://www.exploit-db.com/exploits/18680(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/30/5(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/03/30/6(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/04/03/6(secalert@redhat.com)
http://www.securityfocus.com/bid/52818(secalert@redhat.com)
http://www.waraxe.us/advisory-81.html(secalert@redhat.com)
http://archives.neohapsis.com/archives/bugtraq/2012-03/0167.html(af854a3a-2127-422b-91ae-364da2661108)
http://coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.6.x/edit_one_pic.php?r1=8348&r2=8354(af854a3a-2127-422b-91ae-364da2661108)
http://forum.coppermine-gallery.net/index.php/topic%2C74682.0.html(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/80732(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/80733(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/80734(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/80735(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/18680(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/30/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/03/30/6(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/04/03/6(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/52818(af854a3a-2127-422b-91ae-364da2661108)
http://www.waraxe.us/advisory-81.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.