First published: Tue May 24 2005(Updated: )
The RSS module in PostNuke 0.750 and 0.760RC2 and RC3 allows remote attackers to obtain sensitive information via a direct request to simple_smarty.php, which reveals the path in an error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | =0.750 | |
Postnuke Software Foundation Pnphpbb | =0.760-rc2 | |
Postnuke Software Foundation Pnphpbb | =0.760-rc3 | |
Postnuke Software Foundation Pnphpbb | =0.750 | |
Postnuke Software Foundation Pnphpbb | =0.760_rc2 | |
Postnuke Software Foundation Pnphpbb | =0.760_rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1697 is classified as a medium severity vulnerability due to its potential to expose sensitive information to remote attackers.
CVE-2005-1697 allows remote attackers to obtain sensitive information via a direct request to the vulnerable simple_smarty.php script.
To mitigate CVE-2005-1697, users should upgrade to a version of PostNuke that is not affected, such as later stable releases beyond 0.760.
PostNuke versions 0.750, 0.760RC2, and 0.760RC3 are vulnerable to CVE-2005-1697.
CVE-2005-1697 exploits an information disclosure vulnerability, allowing attackers to view file paths in error messages.