CVE-2010-4781
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
07/04/2011
Last modified:
11/04/2025
Description
index.php in Enano CMS 1.1.7pl1, and possibly other versions before 1.1.8, 1.0.6pl3, and 1.1.7pl2, allows remote attackers to obtain sensitive information via a crafted title parameter, which reveals the installation path in an error message.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:enanocms:enano_cms:*:pl2:*:*:*:*:*:* | 1.1.7 (including) | |
| cpe:2.3:a:enanocms:enano_cms:0.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:0.8.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:0.8.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:0.8.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:0.9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:0.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:0.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:1.0.2b1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:enanocms:enano_cms:1.0.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://enanocms.org/News:Article/2010/11/16/Enano_1.1.8.2c_1.0.6pl3.2c_and_1.1.7pl2_released
- http://packetstormsecurity.org/files/view/96229/enanocms-sqldisclose.txt
- http://securityreason.com/securityalert/8183
- http://www.exploit-db.com/exploits/15645
- http://www.htbridge.ch/advisory/path_disclosure_in_enano_cms.html
- http://www.securityfocus.com/bid/45120
- http://enanocms.org/News:Article/2010/11/16/Enano_1.1.8.2c_1.0.6pl3.2c_and_1.1.7pl2_released
- http://packetstormsecurity.org/files/view/96229/enanocms-sqldisclose.txt
- http://securityreason.com/securityalert/8183
- http://www.exploit-db.com/exploits/15645
- http://www.htbridge.ch/advisory/path_disclosure_in_enano_cms.html
- http://www.securityfocus.com/bid/45120



