First published: Wed Apr 21 2004(Updated: )
PostNuke 0.7.2.6 allows remote attackers to gain information via a direct HTTP request to files in the (1) includes/blocks directory, (2) pnadodb directory, (3) NS-NewUser module, (4) NS-Your_Account, (5) NS-LostPassword module, or (6) NS-User module which reveals the path to the web server in a PHP error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | =0.726 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1956 is classified as a moderate severity vulnerability.
To fix CVE-2004-1956, ensure that sensitive directories are protected or removed and update to a later version of PostNuke if available.
CVE-2004-1956 affects PostNuke version 0.7.2.6 and potentially other versions in the 0.7.x series.
CVE-2004-1956 can expose paths to the web server through unauthorized access to certain directories and files.
CVE-2004-1956 can be exploited by remote attackers without needing any authentication credentials.