Description
BilboBlog 0.2.1 allows remote attackers to obtain sensitive information via (1) an enable_cache=false query string to footer.php or (2) a direct request to pagination.php, which reveals the installation path in an error message.
Exploits (1)
References (2)
Core 2
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43766
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6073
Scores
EPSS
0.0452
EPSS Percentile
89.2%
Details
CWE
CWE-200
Status
published
Products (1)
tuxplanet/bilboblog
0.2.1
Published
Jul 25, 2008
Tracked Since
Feb 18, 2026