Description
registroTL stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for /usuarios.dat.
Exploits (1)
References (4)
Core 4
Core References
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/1734
Exploit x_refsource_misc
http://acid-root.new.fr/poc/13061007.txt
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/448096/100/0/threaded
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/2502
Scores
EPSS
0.0558
EPSS Percentile
90.3%
Details
Status
published
Products (2)
phplibre/registrotl
0.1b
phplibre/registrotl
0.5b
Published
Oct 17, 2006
Tracked Since
Feb 18, 2026