Vulnerability Description
GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via a direct request to (1) data/users/<username>.xml, (2) backups/users/<username>.xml.bak, (3) data/other/authorization.xml, or (4) data/other/appid.xml.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Get-Simple | Getsimple Cms | 3.3.4 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/162906/GetSimple-CMS-3.3.4-Information-Disc
- http://rossmarks.uk/portfolio.phpThird Party Advisory
- http://rossmarks.uk/whitepapers/getSimple_cms_3.3.4.txtExploitThird Party Advisory
- http://packetstormsecurity.com/files/162906/GetSimple-CMS-3.3.4-Information-Disc
- http://rossmarks.uk/portfolio.phpThird Party Advisory
- http://rossmarks.uk/whitepapers/getSimple_cms_3.3.4.txtExploitThird Party Advisory
FAQ
What is CVE-2014-8722?
CVE-2014-8722 is a vulnerability with a CVSS score of 7.5 (HIGH). GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via a direct request to (1) data/users/<username>.xml, (2) backups/users/<username>.xml.bak, (3) data/other/authorization.xm...
How severe is CVE-2014-8722?
CVE-2014-8722 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8722?
Check the references section above for vendor advisories and patch information. Affected products include: Get-Simple Getsimple Cms.