fipsCMS Light 2.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file and obtain sensitive information via a direct request for _fipsdb/db.mdb.Referenceshttps://www.exploit-db.com/exploits/8890https://exchange.xforce.ibmcloud.com/vulnerabilities/50987