Korean
<< Back
VID 21537
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The PhotoPost program is vulnerable to multiple input validation vulnerabilities. PhotoPost PHP Pro is a web-based photo gallery program that uses a MySQL database. PhotoPost PHP Pro versions 5.x are vulnerable to multiple input validation vulnerabilities, which can be exploited by remote attackers to conduct cross-site scripting and SQL injection attacks.

1) Input passed to the "password" and "sort" parameters in "showgallery.php" and the "photo" parameter in "slideshow.php" isn't properly sanitized before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site.
2) Input passed to the "sl" parameter in "showmembers.php" isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

* References:
http://archives.neohapsis.com/archives/bugtraq/2005-03/0477.html
http://secunia.com/advisories/14742/
http://www.osvdb.org/displayvuln.php?osvdb_id=15096
http://www.osvdb.org/displayvuln.php?osvdb_id=15097
http://www.osvdb.org/displayvuln.php?osvdb_id=15098
http://www.osvdb.org/displayvuln.php?osvdb_id=15099
http://www.osvdb.org/displayvuln.php?osvdb_id=15100

* Platforms Affected:
All Enthusiast, Inc., PhotoPost PHP Pro 5.x
Any operating system Any version
Recommendation No upgrade or patch available as of March 2005.

Upgrade to the new version of PhotoPost PHP Pro (5.0.1 later), when new version fixed this problem becomes available from the PhotoPost PHP Pro Web site at http://www.photopost.com/
Related URL CVE-2005-0928,CVE-2005-0929 (CVE)
Related URL 12920 (SecurityFocus)
Related URL 19873,19874 (ISS)