Description
Patrick Michaelis Wili-CMS allows remote attackers to obtain sensitive information via a direct request for (1) thumbnail.php, (2) functions/admin/all.php, (3) functions/admin/init_session.php, (4) functions/all.php, and (5) certain files in example-view/admin_templates/, which reveals the path in various error messages.
Exploits (1)
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/446575/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/29100
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/20134
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/1633
Scores
EPSS
0.0381
EPSS Percentile
88.1%
Details
Status
published
Products (1)
patrick_michaelis/wili-cms
0.1.1
Published
Sep 26, 2006
Tracked Since
Feb 18, 2026