Vulnerability Description
The file server in ActivePost Standard 3.1 and earlier allows remote authenticated users to obtain sensitive information by uploading a file, which reveals the path in a success message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Onnuri Infotek | Activepost Standard | <= 3.1 |
References
- http://aluigi.altervista.org/adv/actp-adv.txtExploitVendor Advisory
- http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0852.htmlExploitVendor Advisory
- http://marc.info/?l=bugtraq&%3Bm=109597139011373&%3Bw=2
- http://securitytracker.com/id?1011406ExploitVendor Advisory
- http://www.osvdb.org/10235
- http://aluigi.altervista.org/adv/actp-adv.txtExploitVendor Advisory
- http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0852.htmlExploitVendor Advisory
- http://marc.info/?l=bugtraq&%3Bm=109597139011373&%3Bw=2
- http://securitytracker.com/id?1011406ExploitVendor Advisory
- http://www.osvdb.org/10235
FAQ
What is CVE-2004-2616?
CVE-2004-2616 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The file server in ActivePost Standard 3.1 and earlier allows remote authenticated users to obtain sensitive information by uploading a file, which reveals the path in a success message.
How severe is CVE-2004-2616?
CVE-2004-2616 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2616?
Check the references section above for vendor advisories and patch information. Affected products include: Onnuri Infotek Activepost Standard.