Secunia Security Advisory - d3hydr8 has reported a vulnerability in CONTENTCustomizer, which can be exploited by malicious people to disclose sensitive information.
92db9a525e473fbcb80e45eace6c68942756b5fd371a58e8036f428b5a9a3be4
----------------------------------------------------------------------
2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.
Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv
----------------------------------------------------------------------
TITLE:
CONTENTCustomizer "dialog.php" Information Disclosure
SECUNIA ADVISORY ID:
SA27440
VERIFY ADVISORY:
http://secunia.com/advisories/27440/
CRITICAL:
Moderately critical
IMPACT:
Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
CONTENTCustomizer 3.x
http://secunia.com/product/16409/
DESCRIPTION:
d3hydr8 has reported a vulnerability in CONTENTCustomizer, which can
be exploited by malicious people to disclose sensitive information.
The vulnerability is caused due to the "dialog.php" file displaying
the username and password of the author of a handled page when being
called directly with the "action" parameter set to "editauthor". This
can potentially be exploited to edit the content of arbitrary pages
handled by CONTENTCustomizer.
The vulnerability is reported in version 3.1mp. Other versions may
also be affected.
SOLUTION:
Restrict access to the CONTENTCustomizer directory to trusted users
only (e.g. with ".htaccess").
PROVIDED AND/OR DISCOVERED BY:
d3hydr8
ORIGINAL ADVISORY:
http://packetstorm.linuxsecurity.com/0710-exploits/contentcustom-disclose.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------