Joomla! 1.5.0 Beta allows remote attackers to obtain sensitive information via a direct request for (1) plugins/user/example.php; (2) gmail.php, (3) example.php, or (4) ldap.php in plugins/authentication/; (5) modules/mod_mainmenu/menu.php; or other unspecified PHP scripts, which reveals the path in various error messages, related to a jimport function call at the beginning of each script.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:19:28.989Z
Reserved: 2007-01-19T00:00:00
Link: CVE-2007-0375

No data.

Status : Modified
Published: 2007-01-19T23:28:00.000
Modified: 2024-11-21T00:25:42.383
Link: CVE-2007-0375

No data.