Description
images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests with full pathnames in the aFonts array parameter, and then observing the error messages, which differ between existing and nonexistent pathnames.
Exploits (1)
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33787
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/48792
Vendor Advisory x_refsource_confirm
http://ravenphpscripts.com/postt17156.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/48983
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/500988/100/0/threaded
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/8068
Exploit x_refsource_misc
http://www.waraxe.us/advisory-72.html
Scores
EPSS
0.0787
EPSS Percentile
92.0%
Details
CWE
CWE-94
Status
published
Products (1)
ravenphpscripts/ravennuke
2.30
Published
Feb 22, 2009
Tracked Since
Feb 18, 2026