Vulnerability Description
Open-Realty 2.5.8 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by install/versions/upgrade_115.inc.php and certain other files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Realty | Open-Realty | 2.5.8 |
Related Weaknesses (CWE)
References
- http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README
- http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/open-realty-2.5
- http://www.openwall.com/lists/oss-security/2011/06/27/6
- https://exchange.xforce.ibmcloud.com/vulnerabilities/70607
- http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README
- http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/open-realty-2.5
- http://www.openwall.com/lists/oss-security/2011/06/27/6
- https://exchange.xforce.ibmcloud.com/vulnerabilities/70607
FAQ
What is CVE-2011-3765?
CVE-2011-3765 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Open-Realty 2.5.8 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by install/versi...
How severe is CVE-2011-3765?
CVE-2011-3765 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3765?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Realty Open-Realty.