content.php in WSPortal 1.0, when magic_quotes_gpc is disabled, allows remote attackers to obtain sensitive information via a "';" (quote semicolon) sequence in the page parameter, which reveals the installation path in the resulting forced SQL error message.
CVE Status: Modified
References:
[email protected][email protected][email protected][email protected][email protected][email protected]af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108af854a3a-2127-422b-91ae-364da2661108
Metrics:
No CVSS data available
Links:
Exploit-db
Github