Description
concrete5 before 5.6.3 allows remote attackers to obtain the installation path via a direct request to (1) system/basics/editor.php, (2) system/view.php, (3) system/environment/file_storage_locations.php, (4) system/mail/importers.php, (5) system/mail/method.php, (6) system/permissions/file_types.php, (7) system/permissions/files.php, (8) system/permissions/tasks.php, (9) system/permissions/users.php, (10) system/seo/view.php, (11) view.php, (12) users/attributes.php, (13) scrapbook/view.php, (14) pages/attributes.php, (15) files/attributes.php, or (16) files/search.php in single_pages/dashboard/.
Remediation
References
Related Vulnerabilities
MySQL CVE-2016-5635 Vulnerability (CVE-2016-5635)
WordPress Plugin FileBird-WordPress Media Library Folders & File Manager Cross-Site Scripting (2.4)
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3092)
WordPress Plugin WP DS FAQ 'ajax.php' SQL Injection (1.3.2)
Jboss EAP Incorrect Authorization Vulnerability (CVE-2019-14843)