RunCMS 2M1, when running with certain error_reporting levels, allows remote attackers to obtain sensitive information via (1) the op[] parameter to modules/contact/index.php or (2) uid[] parameter to userinfo.php, which leaks the installation path in an error message when these parameters are used in a call to the preg_match function.
References
Link | Resource |
---|---|
http://retrogod.altervista.org/9sg_runcms_forum_sql.html | Exploit |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:23:57
Updated: 2022-10-03T16:23:57
Reserved: 2022-10-03T00:00:00
Link: CVE-2009-3815
JSON object: View
NVD Information
Status : Analyzed
Published: 2009-10-27T16:30:00.640
Modified: 2009-10-28T04:00:00.000
Link: CVE-2009-3815
JSON object: View
Redhat Information
No data.
CWE