SAXON 5.4, with display_errors enabled, allows remote attackers to obtain sensitive information via (1) a direct request for news.php, (2) an invalid use of a newsid array parameter to admin/edit-item.php, and possibly unspecified vectors related to additional scripts in (3) admin/, (4) rss/, and (5) the root directory of the installation, which reveal the path in various error messages.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T15:08:33.826Z
Reserved: 2007-09-13T00:00:00
Link: CVE-2007-4861

No data.

Status : Modified
Published: 2007-10-30T21:46:00.000
Modified: 2024-11-21T00:36:36.347
Link: CVE-2007-4861

No data.