CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
77.7%
Just another flat file (JAF) CMS before 3.0 Final allows remote attackers to obtain sensitive information via (1) an * (asterisk) in the id parameter, (2) a blank id parameter, or (3) an * (asterisk) in the disp parameter to index.php, which reveals the path in an error message. NOTE: a followup suggests that this may be a directory traversal or file inclusion vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
salims_softhouse | jaf_cms | 1.0 | cpe:2.3:a:salims_softhouse:jaf_cms:1.0:final:*:*:*:*:*:* |
salims_softhouse | jaf_cms | 1.5 | cpe:2.3:a:salims_softhouse:jaf_cms:1.5:*:*:*:*:*:*:* |
salims_softhouse | jaf_cms | 2.0 | cpe:2.3:a:salims_softhouse:jaf_cms:2.0:beta:*:*:*:*:*:* |
salims_softhouse | jaf_cms | 2.0 | cpe:2.3:a:salims_softhouse:jaf_cms:2.0:final:*:*:*:*:*:* |
salims_softhouse | jaf_cms | 2.0.5 | cpe:2.3:a:salims_softhouse:jaf_cms:2.0.5:*:*:*:*:*:*:* |
salims_softhouse | jaf_cms | 2.1.0 | cpe:2.3:a:salims_softhouse:jaf_cms:2.1.0:*:*:*:*:*:*:* |
salims_softhouse | jaf_cms | 2.5 | cpe:2.3:a:salims_softhouse:jaf_cms:2.5:*:*:*:*:*:*:* |
salims_softhouse | jaf_cms | 3.0 | cpe:2.3:a:salims_softhouse:jaf_cms:3.0:rc:*:*:*:*:*:* |
salims_softhouse | jaf_cms | 3.0 | cpe:2.3:a:salims_softhouse:jaf_cms:3.0:rc_fixed:*:*:*:*:*:* |
salims_softhouse | jaf_cms | 3.0 | cpe:2.3:a:salims_softhouse:jaf_cms:3.0:rc2:*:*:*:*:*:* |