First published: Thu Mar 09 2006(Updated: )
Pixelpost 1.5 beta 1 and earlier allows remote attackers to obtain configuration information via a direct request to includes/phpinfo.php, which calls the phpinfo function. NOTE: the vendor has disputed some issues from the original disclosure, but due to the vagueness of the dispute, it is not clear whether the vendor is disputing this particular issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pixelpost | =1.4.3 | |
Pixelpost | =1.5_beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1105 has been classified as a high severity vulnerability due to the disclosure of sensitive configuration information.
To fix CVE-2006-1105, remove or restrict access to the includes/phpinfo.php file in your Pixelpost installation.
CVE-2006-1105 affects Pixelpost versions 1.4.3 and earlier, as well as 1.5 beta 1.
CVE-2006-1105 can lead to the leakage of sensitive configuration information such as server environment variables.
There is no specific patch for CVE-2006-1105; it is recommended to apply protective measures by securing the affected file.