Korean
<< Back
VID 21696
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The YaPiG, according to its version number, has a script injection vulnerability via EXIF data. YaPiG (Yet Another PHP Image Gallery) is an open source image gallery software written in PHP. YaPig version 0.95b and earlier versions are vulnerable to script injection attacks, caused by improper validation of malicious EXIF data stored in image files. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* Note: This check solely relied on the version number of the YaPiG installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://cedri.cc/advisories/EXIF_XSS.txt
http://secunia.com/advisories/16596/
http://securitytracker.com/id?1014802
http://marc.theaimsgroup.com/?l=bugtraq&m=112511025414488&w=2

* Platforms Affected:
SourceForge.net, YaPig version 0.95b and earlier versions
Any operating system Any version
Recommendation No upgrade or patch available as of June 2014.

Upgrade to the latest version of YaPiG, when new fixed version becomes available from the YaPiG home page at http://yapig.sourceforge.net/index.php
Related URL CVE-2005-2736 (CVE)
Related URL 14670 (SecurityFocus)
Related URL 22020 (ISS)