VID |
21696 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The YaPiG, according to its version number, has a script injection vulnerability via EXIF data. YaPiG (Yet Another PHP Image Gallery) is an open source image gallery software written in PHP. YaPig version 0.95b and earlier versions are vulnerable to script injection attacks, caused by improper validation of malicious EXIF data stored in image files. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of the YaPiG installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://cedri.cc/advisories/EXIF_XSS.txt http://secunia.com/advisories/16596/ http://securitytracker.com/id?1014802 http://marc.theaimsgroup.com/?l=bugtraq&m=112511025414488&w=2
* Platforms Affected: SourceForge.net, YaPig version 0.95b and earlier versions Any operating system Any version |
Recommendation |
No upgrade or patch available as of June 2014.
Upgrade to the latest version of YaPiG, when new fixed version becomes available from the YaPiG home page at http://yapig.sourceforge.net/index.php |
Related URL |
CVE-2005-2736 (CVE) |
Related URL |
14670 (SecurityFocus) |
Related URL |
22020 (ISS) |
|