Vulnerability Description
Quick.Forum 2.1.6 stores potentially sensitive information such as usernames, banned IP addresses, censored words, and backups under the web document root, which allows remote attackers to obtain that information via a direct request to (1) db/users.txt, (2) db/banList.txt, (3) db/censureWords.txt, or (4) backup files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open Solution | Quick.Forum | 2.1.6 |
References
- http://lostmon.blogspot.com/2005/05/quickforum-topic-field-xss-and-page.htmlVendor Advisory
- http://secunia.com/advisories/15200Vendor Advisory
- http://www.osvdb.org/16328Vendor Advisory
- http://www.osvdb.org/16329Vendor Advisory
- http://lostmon.blogspot.com/2005/05/quickforum-topic-field-xss-and-page.htmlVendor Advisory
- http://secunia.com/advisories/15200Vendor Advisory
- http://www.osvdb.org/16328Vendor Advisory
- http://www.osvdb.org/16329Vendor Advisory
FAQ
What is CVE-2005-1586?
CVE-2005-1586 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Quick.Forum 2.1.6 stores potentially sensitive information such as usernames, banned IP addresses, censored words, and backups under the web document root, which allows remote attackers to obtain that...
How severe is CVE-2005-1586?
CVE-2005-1586 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1586?
Check the references section above for vendor advisories and patch information. Affected products include: Open Solution Quick.Forum.