Description
PHP, when not configured with the "display_errors = Off" setting in php.ini, allows remote attackers to obtain the physical path for an include file via a trailing slash in a request to a directly accessible PHP program, which modifies the base path, causes the include directive to fail, and produces an error message that contains the path.
Remediation
References
Related Vulnerabilities
Joomla! Core Information Disclosure (1.5.0 - 3.8.1)
WordPress Plugin Question Answer Multiple Cross-Site Scripting Vulnerabilities (1.2.30)
OpenSSL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-3736)
WordPress Plugin WP Customer Reviews Cross-Site Scripting (3.5.5)