CVE-2006-5702
W Tikiwiki umożliwiono zdalnym atakującym uzyskanie wrażliwych informacji przez błędne parametry.
Tikiwiki 1.9.5 allows remote attackers to obtain sensitive information (MySQL username and password) via an empty sort_mode parameter in (1) tiki-listpages.php, (2) tiki-lastchanges.php, (3) messu-archive.php, (4) messu-mailbox.php, (5) messu-sent.php, (6) tiki-directory_add_site.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-forums.php, (10) tiki-view_forum.php, (11) tiki-friends.php, (12) tiki-list_blogs.php, (13) tiki-list_faqs.php, (14) tiki-list_trackers.php, (15) tiki-list_users.php, (16) tiki-my_tiki.php, (17) tiki-notepad_list.php, (18) tiki-orphan_pages.php, (19) tiki-shoutbox.php, (20) tiki-usermenu.php, and (21) tiki-webmail_contacts.php, which reveal the information in certain database error messages.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 5.0 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 53.4% |
| Opublikowano (NVD) | 2006-11-04 01:07:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-23 00:35:47 UTC |
- http://secunia.com/advisories/22678 (cve@mitre.org) [Vendor Advisory]
- http://secunia.com/advisories/23039 (cve@mitre.org)
- http://security.gentoo.org/glsa/glsa-200611-11.xml (cve@mitre.org)
- http://securityreason.com/securityalert/1816 (cve@mitre.org)
- http://www.securityfocus.com/archive/1/450268/100/0/threaded (cve@mitre.org)
- http://www.securityfocus.com/bid/20858 (cve@mitre.org) [Exploit]
- http://www.vupen.com/english/advisories/2006/4316 (cve@mitre.org)
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29960 (cve@mitre.org)