paFileDB 3.1 and previous versions allows remote malicious users to obtain sensitive information via a direct request to (1) auth.php, (2) login.php, (3) category.php, (4) file.php, (5) team.php, (6) license.php, (7) custom.php, (8) admins.php, or (9) backupdb.php, which reveal the path in a PHP error message.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
php arena pafiledb 3.0_beta_3.1 |
||
php arena pafiledb 3.1 |
||
php arena pafiledb 2.1.1 |
||
php arena pafiledb 3.0 |
||
php arena pafiledb 1.1.3 |