{ "schema_version": "1.4.0", "id": "GHSA-f9f8-58fc-39mq", "modified": "2022-05-17T05:31:39Z", "published": "2022-05-17T05:31:39Z", "aliases": [ "CVE-2011-3732" ], "details": "eggBlog 4.1.2 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by _lib/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php and certain other files.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3732" }, { "type": "WEB", "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README" }, { "type": "WEB", "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/eggblog_4.1.2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6" } ], "database_specific": { "cwe_ids": [ "CWE-200" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-09-23T23:55:00Z" } }