{ "schema_version": "1.4.0", "id": "GHSA-9xv2-96hv-wjc8", "modified": "2022-05-01T07:34:48Z", "published": "2022-05-01T07:34:48Z", "aliases": [ "CVE-2006-6112" ], "details": "LifeType 1.0.x and 1.1.x have insufficient access control for all of the PHP scripts under (1) class/ and (2) plugins/, which allows remote attackers to obtain the installation path via a direct request to any of the scripts, as demonstrated by (a) bayesianfilter.class.php and (b) bootstrap.php, which leaks the path in an error message.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6112" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30635" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/1980" }, { "type": "WEB", "url": "http://www.lifetype.net/blog.php/lifetype-development-journal/2006/11/30/full_path_disclosure_vulnerability_in_lifetype_1.0.x_and_1.1.x" }, { "type": "WEB", "url": "http://www.netvigilance.com/advisory0008" }, { "type": "WEB", "url": "http://www.osvdb.org/30685" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/453135/100/0/threaded" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-12-06T22:28:00Z" } }