Vulnerability Description
home.php in ARSC (Really Simple Chat) 1.0.1 and earlier allows remote attackers to determine the full pathname of the web server via an invalid language in the arsc_language parameter, which leaks the pathname in an error message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arsc Really Simple Chat | Arsc Really Simple Chat | 1.0 |
References
- http://www.iss.net/security_center/static/8472.php
- http://www.securityfocus.com/archive/1/262652Vendor Advisory
- http://www.securityfocus.com/archive/1/262802Vendor Advisory
- http://www.securityfocus.com/bid/4307PatchVendor Advisory
- http://www.iss.net/security_center/static/8472.php
- http://www.securityfocus.com/archive/1/262652Vendor Advisory
- http://www.securityfocus.com/archive/1/262802Vendor Advisory
- http://www.securityfocus.com/bid/4307PatchVendor Advisory
FAQ
What is CVE-2002-0463?
CVE-2002-0463 is a vulnerability with a CVSS score of 5.0 (MEDIUM). home.php in ARSC (Really Simple Chat) 1.0.1 and earlier allows remote attackers to determine the full pathname of the web server via an invalid language in the arsc_language parameter, which leaks the...
How severe is CVE-2002-0463?
CVE-2002-0463 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0463?
Check the references section above for vendor advisories and patch information. Affected products include: Arsc Really Simple Chat Arsc Really Simple Chat.