Published on November 24th, 2019 📆 | 5075 Views ⚑0
Mijosoft MijoSearch up to 2.0.1 on Joomla Error Message search information disclosure
|CVSS Meta Temp Score||Current Exploit Price (≈)||CTI Interest Score|
A vulnerability, which was classified as problematic, was found in Mijosoft MijoSearch up to 2.0.1 on Joomla (Joomla Component). This affects some unknown functionality of the file component/mijosearch/search of the component Error Message Handler. The manipulation with an unknown input leads to a information disclosure vulnerability. CWE is classifying the issue as CWE-200. This is going to have an impact on confidentiality.
The bug was discovered 12/16/2013. The weakness was disclosed 11/22/2019. This vulnerability is uniquely identified as CVE-2013-6879 since 11/26/2013. It is possible to initiate the attack remotely. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 11/23/2019).
The vulnerability was handled as a non-public zero-day exploit for at least 2167 days. During that time the estimated underground price was around $0-$5k.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The entry 146126 is pretty similar.
VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 4.3
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day unlock unlock unlock unlock Today unlock unlock unlock unlock
0-Day Time: 🔒
11/26/2013 CVE assigned
12/16/2013 +20 days Vulnerability found
11/22/2019 +2167 days Advisory disclosed
11/23/2019 +1 days VulDB entry created
11/23/2019 +0 days VulDB last update
CVE: CVE-2013-6879 (🔒)
See also: 🔒
Created: 11/23/2019 08:03 AM Download the whitepaper to learn more about our service!
Download the whitepaper to learn more about our service!