index.php in Zen Cart 1.3.0.2 allows remote malicious users to obtain sensitive information via empty (1) _GET[], (2) _SESSION[], (3) _POST[], (4) _COOKIE[], or (5) _SESSION[] array parameters, which reveals the installation path in an error message. NOTE: this issue might be resultant from a global overwrite vulnerability.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
zen cart zen cart 1.3.0.2 |