DCP-Portal incorrect language selection path disclosure
|dcpportal-language-path-disclosure (8310)||Low Risk|
DCP-Portal could reveal sensitive information to a remote attacker. If a remote attacker submits a URL request that specifies an unsupported language, the attacker can cause an error page to return that would display the full path to the Web root directory and possibly other sensitive information. This information could be used to launch further attacks against the affected Web server.
Upgrade to the latest version of DCP-Portal (4.5.1 or later), available from the DCP-Portal Web site. See References.
- ALPER Research Labs Security Advisory ARL02-A02: DCP-Portal Root Path Disclosure Vulnerability.
- ALPER Research Labs Security Advisory ARL02-A04: DCP-Portal System Information Path Disclosure Vulnerability.
- DCP-Portal Web site: DCP-Portal.com::DCP-Portal - Download.
- BID-4113: DCP-Portal System Information Path Disclosure Vulnerability
- CVE-2002-0282: DCP-Portal 3.7 through 4.5 allows remote attackers to obtain the physical path of the server via (1) a direct request to add_user.php, or via an invalid new_language parameter in (2) contents.php, (3) categories.php, or (4) files.php, which leaks the path in an error message.
- OSVDB ID: 7015: DCP-Portal contents.php Invalid Language Path Disclosure
- OSVDB ID: 7016: DCP-Portal categories.php Invalid Language Path Disclosure
- OSVDB ID: 7017: DCP-Portal files.php Invalid Language Path Disclosure
- OSVDB ID: 7018: DCP-Portal add_user.php Direct Request Path Disclosure
- DCP-Portal DCP-Portal 3.6
- DCP-Portal DCP-Portal 3.7
- DCP-Portal DCP-Portal 4.0 final
- DCP-Portal DCP-Portal 4.1 final
- DCP-Portal DCP-Portal 4.2
- DCP-Portal DCP-Portal 4.5
Feb 28, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this