Vulnerability Description
PostNuke 0.7.2.6 allows remote attackers to gain information via a direct HTTP request to files in the (1) includes/blocks directory, (2) pnadodb directory, (3) NS-NewUser module, (4) NS-Your_Account, (5) NS-LostPassword module, or (6) NS-User module which reveals the path to the web server in a PHP error message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Postnuke Software Foundation | Postnuke | 0.726 |
References
- http://marc.info/?l=bugtraq&m=108258902000472&w=2
- http://www.securityfocus.com/bid/10191ExploitVendor Advisory
- http://www.waraxe.us/index.php?modname=sa&id=22ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15933
- http://marc.info/?l=bugtraq&m=108258902000472&w=2
- http://www.securityfocus.com/bid/10191ExploitVendor Advisory
- http://www.waraxe.us/index.php?modname=sa&id=22ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15933
FAQ
What is CVE-2004-1956?
CVE-2004-1956 is a vulnerability with a CVSS score of 5.0 (MEDIUM). PostNuke 0.7.2.6 allows remote attackers to gain information via a direct HTTP request to files in the (1) includes/blocks directory, (2) pnadodb directory, (3) NS-NewUser module, (4) NS-Your_Account,...
How severe is CVE-2004-1956?
CVE-2004-1956 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1956?
Check the references section above for vendor advisories and patch information. Affected products include: Postnuke Software Foundation Postnuke.