Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Installation Path Disclosure in paFileDB - exploit.company
header-logo
Suggest Exploit
vendor:
paFileDB
by:
3.3
CVSS
LOW
Installation Path Disclosure
200
CWE
Product Name: paFileDB
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Installation Path Disclosure in paFileDB

paFileDB is prone to an installation path disclosure. If invalid requests are made to certain scripts, the installation path is included in the returned error message.

Mitigation:

The vendor has not released a patch or mitigation details for this vulnerability. It is recommended to restrict access to the affected scripts and closely monitor for any unauthorized access or abuse.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11817/info

paFileDB is prone to an installation path disclosure. If invalid requests are made to certain scripts, the installation path is included in the returned error message.

http://www.example.com/pafiledb/includes/admin/admins.php
http://www.example.com/pafiledb/includes/admin/category.php
http://www.example.com/pafiledb/includes/team.php