VID |
21880 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Coppermine Gallery is vulnerable to a local file include vulnerability via the 'file' parameter. Coppermine Photo Gallery, developed by Gregory Demar, is a freely available PHP-based image gallery script that uses a MySQL backend database. Coppermine Photo Gallery version 1.4.4 could are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'file' parameter of the 'index.php' script. A remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://coppermine-gallery.net/forum/index.php?topic=30655.0 http://www.securityfocus.com/archive/1/431062/30/0/threaded http://myimei.com/security/2006-04-14/copperminephotogallery144-plugininclusionsystemindexphp-remotefileinclusion-attack.html
* Platforms Affected: Gregory Demar, Coppermine Photo Gallery version 1.4.4 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Coppermine Photo Gallery (1.4.5 or later), available from the Coppermine Photo Gallery Web site at http://coppermine.sourceforge.net |
Related URL |
CVE-2006-1909 (CVE) |
Related URL |
17570 (SecurityFocus) |
Related URL |
25866 (ISS) |
|