ID CVE-2011-3774
Type cve
Reporter cve@mitre.org
Modified 2017-08-29T01:30:00
Description
php Easy Survey Package (phpESP) 2.1.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by public/landing.php and certain other files.
{"id": "CVE-2011-3774", "bulletinFamily": "NVD", "title": "CVE-2011-3774", "description": "php Easy Survey Package (phpESP) 2.1.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by public/landing.php and certain other files.", "published": "2011-09-24T00:55:00", "modified": "2017-08-29T01:30:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3774", "reporter": "cve@mitre.org", "references": ["http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README", "https://exchange.xforce.ibmcloud.com/vulnerabilities/70546", "http://www.openwall.com/lists/oss-security/2011/06/27/6", "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHP-Easy-Survey-Package-2.1.1"], "cvelist": ["CVE-2011-3774"], "type": "cve", "lastseen": "2019-05-29T18:11:21", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "924b26d9925d343107b5c73591599e8f"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "d32aa2de16d02d49a0d11d2a9a5d303c"}, {"key": "cpe23", "hash": "7a9e69a9a097385465377c11eee584e9"}, {"key": "cvelist", "hash": "121e0ebf2ea7554ee8d20e77cac40c36"}, {"key": "cvss", "hash": "a89198c45ce87f7ec9735a085150b708"}, {"key": "cvss2", "hash": "f30109dfdbfbf783c0b61792a6b2c20a"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "b647a850fd42b235dd11ee60cf626f2d"}, {"key": "description", "hash": "98d6edd2e706f606e446d172b834923e"}, {"key": "href", "hash": "a5515f4574f75e0440cdb7a60a9b3286"}, {"key": "modified", "hash": "79f130ef461e5fcadeacc002df89c60a"}, {"key": "published", "hash": "39a4de6bb1efd075fadc189d73f9b12d"}, {"key": "references", "hash": "b82f89be0eafed16cce25254848591a4"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "25ba90f8a32485e56a6eae5d6695978e"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "07e3d5e45a96994a665f8fd039480920b8af05a836a92419e76d0ca21369b7de", "viewCount": 0, "enchantments": {"score": {"value": 5.3, "vector": "NONE", "modified": "2019-05-29T18:11:21"}, "dependencies": {"references": [], "modified": "2019-05-29T18:11:21"}, "vulnersScore": 5.3}, "objectVersion": "1.3", "cpe": ["cpe:/a:bishop_bettini:phpesp:2.1.1"], "affectedSoftware": [{"name": "bishop_bettini phpesp", "operator": "eq", "version": "2.1.1"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:bishop_bettini:phpesp:2.1.1:*:*:*:*:*:*:*"], "cwe": ["CWE-200"]}
{}