Korean
<< Back
VID 21847
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Coppermine Gallery is vulnerable to multiple file include vulnerabilities which exist in versions 1.4.3 and earlier. Coppermine Photo Gallery, developed by Gregory Demar, is a freely available PHP-based image gallery script that uses a MySQL backend database. Coppermine Photo Gallery versions 1.4.3 and earlier could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the f parameter of the docs/showdoc.php script and the lang parameter of the include/init.inc.php script. A remote attacker could exploit these vulnerabilities to execute arbitrary PHP script code and system commands in the security context of the Web server process.

* References:
http://retrogod.altervista.org/cpg_143_adv.html
http://www.securityfocus.com/archive/1/425387/30/0/threaded
http://coppermine-gallery.net/forum/index.php?topic=28062.0
http://secunia.com/advisories/18941/

* Platforms Affected:
Gregory Demar, Coppermine Photo Gallery versions 1.4.3 and earlier
Any operating system Any version
Recommendation Patch the affected scripts, as listed in the Coppermine Photo Gallery Web site at http://coppermine-gallery.net/forum/index.php?topic=28062.0

-- OR --

Upgrade to the latest version of Coppermine Photo Gallery (1.4.4 or later), available from the Coppermine Photo Gallery Web site at http://coppermine.sourceforge.net
Related URL CVE-2006-0872,CVE-2006-0873 (CVE)
Related URL 16718 (SecurityFocus)
Related URL 24814,24816 (ISS)