Description
paFileDB 3.1 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) auth.php, (2) login.php, (3) category.php, (4) file.php, (5) team.php, (6) license.php, (7) custom.php, (8) admins.php, or (9) backupdb.php, which reveal the path in a PHP error message.
Exploits (1)
References (1)
Core 1
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111066293914977&w=2
Scores
EPSS
0.0362
EPSS Percentile
87.9%
Details
Status
published
Products (5)
php_arena/pafiledb
1.1.3
php_arena/pafiledb
2.1.1
php_arena/pafiledb
3.0
php_arena/pafiledb
3.0_beta_3.1
php_arena/pafiledb
3.1
Published
Mar 12, 2005
Tracked Since
Feb 18, 2026