Vulnerability Description
Joomla! 1.0.12 allows remote attackers to obtain sensitive information via a direct request for (1) Stat.php (2) OutputFilter.php, (3) OutputCache.php, (4) Modifier.php, (5) Reader.php, and (6) TemplateCache.php in includes/patTemplate/patTemplate/; (7) includes/Cache/Lite/Output.php; and other unspecified components, which reveal the path in various error messages.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomla | Joomla | 1.0.12 |
References
- http://osvdb.org/39037
- http://osvdb.org/39038
- http://osvdb.org/39039
- http://osvdb.org/39040
- http://osvdb.org/39041
- http://osvdb.org/39042
- http://osvdb.org/39043
- http://www.securityfocus.com/archive/1/475066/100/0/threaded
- http://www.securityfocus.com/archive/1/480738/100/0/threaded
- http://www.securityfocus.com/archive/1/480757/100/0/threaded
- http://www.securityfocus.com/archive/1/480809/100/0/threaded
- http://osvdb.org/39037
- http://osvdb.org/39038
- http://osvdb.org/39039
- http://osvdb.org/39040
FAQ
What is CVE-2007-4185?
CVE-2007-4185 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Joomla! 1.0.12 allows remote attackers to obtain sensitive information via a direct request for (1) Stat.php (2) OutputFilter.php, (3) OutputCache.php, (4) Modifier.php, (5) Reader.php, and (6) Templa...
How severe is CVE-2007-4185?
CVE-2007-4185 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4185?
Check the references section above for vendor advisories and patch information. Affected products include: Joomla Joomla.