Korean
<< Back
VID 21800
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The PhotoPost, according to its version number, has a cross-site scripting vulnerability via the EXIF data. PhotoPost PHP Pro is a web-based photo gallery program that uses a MySQL database. PhotoPost Pro versions 5.1 and earlier are vulnerable to a cross-site scripting attack, caused by improper validation of malicious EXIF data stored in image files. This vulnerability could permit a remote attacker to create a specially-crafted URL containing malicious EXIF data within image files. If this URL were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* Note: This check solely relied on the version number of the PhotoPost installed on the remote web server to assess this vulnerability, so this might be a false positive.

* References:
http://cedri.cc/advisories/EXIF_XSS.txt
http://marc.theaimsgroup.com/?l=bugtraq&m=112511025414488&w=2
http://secunia.com/advisories/16594/
http://securitytracker.com/alerts/2005/Aug/1014800.html
http://www.frsirt.com/english/advisories/2005/1535

* Platforms Affected:
All Enthusiast Inc., PhotoPost PHP Pro versions 5.1 and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of PhotoPost PHP Pro (5.2 or later), available from PhotoPost PHP Pro Web site at http://www.photopost.com
Related URL CVE-2005-2737 (CVE)
Related URL 14671 (SecurityFocus)
Related URL 22020 (ISS)