Description
languages.inc.php in DynPG CMS 4.2.0 allows remote attackers to obtain sensitive information via a direct request, which reveals the installation path in an error message.
Exploits (1)
exploitdb
WORKING POC
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/15646
References (5)
Core 5
Core References
Patch x_refsource_confirm
http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226
Exploit x_refsource_misc
http://packetstormsecurity.org/files/view/96230/dynpg-lfisqldisclose.txt
Exploit x_refsource_misc
http://www.htbridge.ch/advisory/path_disclosure_in_dynpg.html
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/15646
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/69632
Scores
EPSS
0.0438
EPSS Percentile
89.0%
Details
CWE
CWE-200
Status
published
Products (1)
dynpg/dynpg
4.2.0
Published
Dec 06, 2010
Tracked Since
Feb 18, 2026