Just another flat file (JAF) CMS before 3.0 Final allows remote attackers to obtain sensitive information via (1) an * (asterisk) in the id parameter, (2) a blank id parameter, or (3) an * (asterisk) in the disp parameter to index.php, which reveals the path in an error message. NOTE: a followup suggests that this may be a directory traversal or file inclusion vulnerability.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Jaf_cms | Salims_softhouse | 1.0-final (including) | 1.0-final (including) |
Jaf_cms | Salims_softhouse | 1.5 (including) | 1.5 (including) |
Jaf_cms | Salims_softhouse | 2.0-beta (including) | 2.0-beta (including) |
Jaf_cms | Salims_softhouse | 2.0-final (including) | 2.0-final (including) |
Jaf_cms | Salims_softhouse | 2.0.5 (including) | 2.0.5 (including) |
Jaf_cms | Salims_softhouse | 2.1.0 (including) | 2.1.0 (including) |
Jaf_cms | Salims_softhouse | 2.5 (including) | 2.5 (including) |
Jaf_cms | Salims_softhouse | 3.0-rc (including) | 3.0-rc (including) |
Jaf_cms | Salims_softhouse | 3.0-rc_fixed (including) | 3.0-rc_fixed (including) |
Jaf_cms | Salims_softhouse | 3.0-rc2 (including) | 3.0-rc2 (including) |