Vulnerability Description
Joomla! 1.5.0 Beta allows remote attackers to obtain sensitive information via a direct request for (1) plugins/user/example.php; (2) gmail.php, (3) example.php, or (4) ldap.php in plugins/authentication/; (5) modules/mod_mainmenu/menu.php; or other unspecified PHP scripts, which reveals the path in various error messages, related to a jimport function call at the beginning of each script.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomla | Joomla | 1.5.0_beta |
References
- http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.htmlExploitVendor Advisory
- http://osvdb.org/32522
- http://osvdb.org/32523
- http://osvdb.org/32524
- http://osvdb.org/32525
- http://osvdb.org/32526
- http://www.hackers.ir/advisories/festival.txtVendor Advisory
- http://www.securityfocus.com/archive/1/459203/100/0/threaded
- http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.htmlExploitVendor Advisory
- http://osvdb.org/32522
- http://osvdb.org/32523
- http://osvdb.org/32524
- http://osvdb.org/32525
- http://osvdb.org/32526
- http://www.hackers.ir/advisories/festival.txtVendor Advisory
FAQ
What is CVE-2007-0375?
CVE-2007-0375 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Joomla! 1.5.0 Beta allows remote attackers to obtain sensitive information via a direct request for (1) plugins/user/example.php; (2) gmail.php, (3) example.php, or (4) ldap.php in plugins/authenticat...
How severe is CVE-2007-0375?
CVE-2007-0375 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0375?
Check the references section above for vendor advisories and patch information. Affected products include: Joomla Joomla.