Description
dBlog CMS, probably 2.0, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing an admin password hash via a direct request for dblog.mdb.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by AnTi SeCuRe · textwebappswindows
https://www.exploit-db.com/exploits/10514
References (5)
Core 5
Core References
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3156
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/43970
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/479969/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36703
Vendor Advisory x_refsource_misc
http://www.waraxe.us/advisory-52.html
Scores
EPSS
0.0599
EPSS Percentile
90.7%
Details
CWE
CWE-264
Status
published
Products (1)
dblog/dblog_cms
2.0
Published
Sep 21, 2007
Tracked Since
Feb 18, 2026