Description
TOPo 1.43 allows remote attackers to obtain sensitive information by sending an HTTP request with an invalid parameter to (1) in.php or (2) out.php, which reveals the path to the TOPo directory in the error message.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Rynho Zeros Web · textwebappsphp
https://www.exploit-db.com/exploits/22222
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/11248
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/8008
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/6768
Patch mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2003-02/0049.html
Scores
EPSS
0.0479
EPSS Percentile
89.5%
Details
CWE
CWE-200
Status
published
Products (1)
ej3/topo
1.43
Published
Dec 31, 2003
Tracked Since
Feb 18, 2026