VID |
21800 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The PhotoPost, according to its version number, has a cross-site scripting vulnerability via the EXIF data. PhotoPost PHP Pro is a web-based photo gallery program that uses a MySQL database. PhotoPost Pro versions 5.1 and earlier are vulnerable to a cross-site scripting attack, caused by improper validation of malicious EXIF data stored in image files. This vulnerability could permit a remote attacker to create a specially-crafted URL containing malicious EXIF data within image files. If this URL were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of the PhotoPost installed on the remote web server to assess this vulnerability, so this might be a false positive.
* References: http://cedri.cc/advisories/EXIF_XSS.txt http://marc.theaimsgroup.com/?l=bugtraq&m=112511025414488&w=2 http://secunia.com/advisories/16594/ http://securitytracker.com/alerts/2005/Aug/1014800.html http://www.frsirt.com/english/advisories/2005/1535
* Platforms Affected: All Enthusiast Inc., PhotoPost PHP Pro versions 5.1 and earlier Any operating system Any version |
Recommendation |
Upgrade to the latest version of PhotoPost PHP Pro (5.2 or later), available from PhotoPost PHP Pro Web site at http://www.photopost.com |
Related URL |
CVE-2005-2737 (CVE) |
Related URL |
14671 (SecurityFocus) |
Related URL |
22020 (ISS) |
|