Vulnerability Description
index.php in phpWebSite 0.10.0 and earlier allows remote attackers to obtain sensitive information via an invalid SEA_search_module parameter, which reveals the path in a PHP error message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpwebsite | Phpwebsite | 0.9.0 |
References
- http://marc.info/?l=bugtraq&m=110935172116369&w=2
- http://neossecurity.net/Advisories/Advisory-05.txtVendor AdvisoryURL Repurposed
- http://www.gentoo.org/security/en/glsa/glsa-200503-04.xmlPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19480
- http://marc.info/?l=bugtraq&m=110935172116369&w=2
- http://neossecurity.net/Advisories/Advisory-05.txtVendor AdvisoryURL Repurposed
- http://www.gentoo.org/security/en/glsa/glsa-200503-04.xmlPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19480
FAQ
What is CVE-2005-0572?
CVE-2005-0572 is a vulnerability with a CVSS score of 5.0 (MEDIUM). index.php in phpWebSite 0.10.0 and earlier allows remote attackers to obtain sensitive information via an invalid SEA_search_module parameter, which reveals the path in a PHP error message.
How severe is CVE-2005-0572?
CVE-2005-0572 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0572?
Check the references section above for vendor advisories and patch information. Affected products include: Phpwebsite Phpwebsite.