Description
MyABraCaDaWeb 1.0.2 and earlier allows remote attackers to obtain sensitive information via an invalid IDAdmin or other parameter, which reveals the installation path in an error message.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by gregory Le Bras · textwebappsphp
https://www.exploit-db.com/exploits/22378
References (6)
Core 6
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/8320
Exploit vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1006308
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/315317/30/25460/threaded
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/7126
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3717
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/11556
Scores
EPSS
0.0642
EPSS Percentile
91.1%
Details
CWE
CWE-200
Status
published
Products (1)
myabracadaweb/myabracadaweb
< 1.0.2
Published
Dec 31, 2003
Tracked Since
Feb 18, 2026