Exponent CMS Multiple Script pathos_core_version Parameter Path Disclosure

medium Nessus Plugin ID 16250

Synopsis

A web application running on the remote host has an information disclosure vulnerability.

Description

The remote host is running Exponent, a web-based content management system implemented in PHP.

Directly requesting several different pages reveals the absolute path where Exponent is installed. A remote attacker could use this information to mount further attacks.

In addition, the installed version is likely to be affected to multiple cross-site scripting vulnerabilities, although Nessus has not checked for them.

Solution

Upgrade to Exponent 0.96 beta5 or later.

See Also

https://seclists.org/bugtraq/2005/Jan/296

Plugin Details

Severity: Medium

ID: 16250

File Name: exponent_multiple.nasl

Version: 1.20

Type: remote

Family: CGI abuses

Published: 1/25/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 1/25/2005

Reference Information

CVE: CVE-2005-0310

BID: 12358

Secunia: 13988