Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Interchange Remote Information Disclosure Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
Interchange
by:
5.5
CVSS
MEDIUM
Remote Information Disclosure
200
CWE
Product Name: Interchange
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Interchange Remote Information Disclosure Vulnerability

Interchange is prone to a remote information disclosure vulnerability that allows attackers to disclose contents of arbitrary variables via URI requests. This vulnerability can be exploited by sending a crafted request to the affected application.

Mitigation:

To mitigate this vulnerability, it is recommended to ensure that the application is up-to-date with the latest security patches and updates. Additionally, access controls should be implemented to restrict unauthorized access to sensitive information.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10005/info

It has been reported that Interchange may be prone to a remote information disclosure vulnerability allowing attackers to disclose contents of arbitrary variables via URI requests.

This issue may allow an attacker to gain access to sensitive information that may be used to launch further attacks against a system. 

http://www.example.com/cgi-bin/store/__SQLUSER__