CVE-2006-4989

Wili-CMS - Info Disclosure

Title source: llm
STIX 2.1

Description

Patrick Michaelis Wili-CMS allows remote attackers to obtain sensitive information via a direct request for (1) thumbnail.php, (2) functions/admin/all.php, (3) functions/admin/init_session.php, (4) functions/all.php, and (5) certain files in example-view/admin_templates/, which reveals the path in various error messages.

Exploits (1)

exploitdb WRITEUP VERIFIED
by HACKERS PAL · textwebappsphp
https://www.exploit-db.com/exploits/2414

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/446575/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/29100
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/20134
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/1633

Scores

EPSS 0.0381
EPSS Percentile 88.1%

Details

Status published
Products (1)
patrick_michaelis/wili-cms 0.1.1
Published Sep 26, 2006
Tracked Since Feb 18, 2026