Hesk 2.2 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by inc/footer.inc.php and certain other files.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2011-09-23T23:00:00Z
Updated: 2024-09-17T00:31:28.254Z
Reserved: 2011-09-23T00:00:00Z
Link: CVE-2011-3743
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2011-09-23T23:55:03.647
Modified: 2012-03-12T04:00:00.000
Link: CVE-2011-3743
Redhat
No data.