Exponent Multiple Vulnerabilities Exponent is a fully-featured, modern CMS written in PHP, that enables non-technical people to manage and update their websites with minimal effort. Exponent is also an attractive development platform for traditional and non-traditional web applications. it's great cms http://www.exponentcms.org Credit: The information has been provided by Hamid Ebadi ( www.bugtraq.ir Iran Security Research ) The original article can be found at : http://www.bugtraq.ir/articles/advisory/exponent_multiple_vulnerabilities/10 Vulnerable: Exponent exponent-0.96.6-Alpha and below 1 ) Exponent Directory traversal (Exposure of sensitive information) Input passed to the "icodir" parameters in "iconspopup.php" isn't properly verified. This can be exploited by malicious people to disclose sensitive information (using "../" directory traversal character sequence.) Vulnerable Code : //line 40 define('ICONDIR',BASE.str_replace(PATH_RELATIVE,"",$_GET['icodir'])); . . . $dh = opendir(ICONDIR); $counter = 0; while (($file = readdir($dh)) !== false) { if (is_readable(ICONDIR.$file) && is_file(ICONDIR.$file)) { $iconfiles[$thisrow][] = $file; $counter++; if ($counter >= $perrow) { $counter = 0; $thisrow++; $iconfiles[$thisrow] = array(); } } } } else $good = false; // . . . //line 73 '; for ($j = 0; $j < count($iconfiles[$i]); $j++) { echo '