CVE-2008-5898

CodeAvalanche Directory - Info Disclosure

Title source: llm
STIX 2.1

Description

CodeAvalanche Directory stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing the administrator password via a direct request for _private/CADirectory.mdb. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Pouya_Server · textwebappsasp
https://www.exploit-db.com/exploits/7468

References (4)

Core 4
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33100
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47353
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4907
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7468

Scores

EPSS 0.0393
EPSS Percentile 88.4%

Details

CWE
CWE-264
Status published
Products (1)
codeavalanche/directory _nil_
Published Jan 12, 2009
Tracked Since Feb 18, 2026