Zorum 3.5 allows remote attackers to obtain the full installation path via direct requests to (1) gorum/notification.php, (2) user.php, (3) attach.php, (4) blacklist.php, (5) zorum/forum.php, (6) globalstat.php, (7) gorum/trace.php, (8) gorum/badwords.php, or (9) gorum/flood.php.
                
            References
                    | Link | Resource | 
|---|---|
| http://marc.info/?l=bugtraq&m=112438781604862&w=2 | |
| http://rgod.altervista.org/zorum.html | Exploit Vendor Advisory | 
| http://securitytracker.com/id?1014725 | Exploit Vendor Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/21914 | |
| http://marc.info/?l=bugtraq&m=112438781604862&w=2 | |
| http://rgod.altervista.org/zorum.html | Exploit Vendor Advisory | 
| http://securitytracker.com/id?1014725 | Exploit Vendor Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/21914 | 
Configurations
                    History
                    No history.
Information
                Published : 2005-08-23 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-2652
Mitre link : CVE-2005-2652
CVE.ORG link : CVE-2005-2652
JSON object : View
Products Affected
                phpoutsourcing
- zorum
CWE
                