First published: Fri Dec 31 2004(Updated: )
AJ-Fork 167 allows remote attackers to gain sensitive information via a direct request to (1) auto-acronyms.php, (2) auto-archive.php, (3) ount-article-views.php, (4) kses.php, (5) custom-quick-tags.php, (6) disable-all-comments.php, (7) easy-date-format.php, (8) enable-disable-comments.php, (9) filter-by-author.php, (10) format-switcher.php, (11) long-to-short.php, (12) prospective-posting.php, or (13) sort-by-xfield.php, which displays the full path in an error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aj-fork Aj-fork | =167 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1571 is categorized as a moderate severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2004-1571, update AJ-Fork to a version that has addressed this vulnerability.
CVE-2004-1571 can expose sensitive information through specific PHP files in the AJ-Fork installation.
CVE-2004-1571 affects AJ-Fork version 167.
Yes, CVE-2004-1571 allows remote attackers to exploit the vulnerability without needing local access.