Description
XOOPS 2.0, and possibly earlier versions, allows remote attackers to obtain sensitive information via an invalid xoopsOption parameter, which reveals the installation path in an error message.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by gregory Le Bras · textwebappsphp
https://www.exploit-db.com/exploits/22389
References (6)
Core 6
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/7149
Various Sources x_refsource_misc
http://www.security-corporation.com/index.php?id=advisories&a=011-FR
Exploit mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=104820295115420&w=2
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=104887510828106&w=2
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/8353
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/11587
Scores
EPSS
0.0808
EPSS Percentile
92.2%
Details
CWE
CWE-200
Status
published
Products (1)
xoops/xoops
< 2.0
Published
Dec 31, 2003
Tracked Since
Feb 18, 2026