Hesk 2.2 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by inc/footer.inc.php and certain other files.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2011-09-23T23:00:00Z

Updated: 2024-09-17T00:31:28.254Z

Reserved: 2011-09-23T00:00:00Z

Link: CVE-2011-3743

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2011-09-23T23:55:03.647

Modified: 2012-03-12T04:00:00.000

Link: CVE-2011-3743

cve-icon Redhat

No data.