Korean
<< Back
VID 21695
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Coppermine Gallery, according to its version number, has a script injection vulnerability via EXIF data. Coppermine Photo Gallery, developed by Gregory Demar, is a freely available PHP-based image gallery script that uses a MySQL backend database. Coppermine Photo Gallery versions 1.3.3 and earlier are vulnerable to script injection attacks, caused by improper validation of malicious EXIF data stored in image files. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* Note: This check solely relied on the version number of the Coppermine Photo Gallery installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://coppermine-gallery.net/forum/index.php?topic=20933.0
http://secunia.com/advisories/16499/

* Platforms Affected:
Gregory Demar, Coppermine Photo Gallery versions 1.3.3 and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of Coppermine Photo Gallery (1.3.4 or later), available from the Coppermine Photo Gallery Web site at http://coppermine.sourceforge.net
Related URL CVE-2005-2676 (CVE)
Related URL 14625 (SecurityFocus)
Related URL 21973 (ISS)