CVE-2009-0674

RavenNuke 2.30 - Info Disclosure

Title source: llm
STIX 2.1

Description

images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests with full pathnames in the aFonts array parameter, and then observing the error messages, which differ between existing and nonexistent pathnames.

Exploits (1)

exploitdb WRITEUP VERIFIED
by waraxe · textwebappsphp
https://www.exploit-db.com/exploits/8068

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/33787
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/48792
Vendor Advisory x_refsource_confirm
http://ravenphpscripts.com/postt17156.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/48983
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/500988/100/0/threaded
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/8068
Exploit x_refsource_misc
http://www.waraxe.us/advisory-72.html

Scores

EPSS 0.0787
EPSS Percentile 92.0%

Details

CWE
CWE-94
Status published
Products (1)
ravenphpscripts/ravennuke 2.30
Published Feb 22, 2009
Tracked Since Feb 18, 2026