First published: Fri Mar 17 2017(Updated: )
GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via a direct request to (1) data/users/<username>.xml, (2) backups/users/<username>.xml.bak, (3) data/other/authorization.xml, or (4) data/other/appid.xml.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GetSimple CMS | =3.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8722 is classified as having a moderate severity level due to its potential for sensitive information disclosure.
To mitigate CVE-2014-8722, it's recommended to ensure that sensitive files are not publicly accessible or to upgrade to a patched version of GetSimple CMS.
CVE-2014-8722 allows remote attackers to access sensitive user data stored in XML files.
CVE-2014-8722 specifically affects GetSimple CMS version 3.3.4.
Yes, CVE-2014-8722 can be exploited by remote attackers to directly request and obtain sensitive XML files.