6.9 Medium
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.01 Low
EPSS
Percentile
83.6%
PhpList allows remote attackers to obtain sensitive information via a direct request to (1) about.php, (2) connect.php, (3) domainstats.php or (4) usercheck.php in public_html/lists/admin directory, (5) attributes.php, (6) dbcheck.php, (7) importcsv.php, (8) user.php, (9) usermgt.php, or (10) users.php in admin/commonlib/pages directory, (11) helloworld.php, or (12) sidebar.php in public_html/lists/admin/plugins directory, or (13) main.php in public_html/lists/admin/plugsins/defaultplugin directory, which reveal the path in an error message.
CPE | Name | Operator | Version |
---|---|---|---|
tincan:phplist | tincan phplist | eq | * |
marc.info/?l=bugtraq&m=112258115325054&w=2
www.osvdb.org/18317
www.osvdb.org/18318
www.osvdb.org/18319
www.osvdb.org/18320
www.osvdb.org/18321
www.osvdb.org/18322
www.osvdb.org/18323
www.osvdb.org/18324
www.osvdb.org/18325
www.osvdb.org/18326
www.osvdb.org/18327
www.osvdb.org/18328
www.osvdb.org/18329
exchange.xforce.ibmcloud.com/vulnerabilities/21579