Korean
<< Back
VID 21880
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Coppermine Gallery is vulnerable to a local file include vulnerability via the 'file' parameter. Coppermine Photo Gallery, developed by Gregory Demar, is a freely available PHP-based image gallery script that uses a MySQL backend database. Coppermine Photo Gallery version 1.4.4 could are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'file' parameter of the 'index.php' script. A remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.

* References:
http://coppermine-gallery.net/forum/index.php?topic=30655.0
http://www.securityfocus.com/archive/1/431062/30/0/threaded
http://myimei.com/security/2006-04-14/copperminephotogallery144-plugininclusionsystemindexphp-remotefileinclusion-attack.html

* Platforms Affected:
Gregory Demar, Coppermine Photo Gallery version 1.4.4
Any operating system Any version
Recommendation Upgrade to the latest version of Coppermine Photo Gallery (1.4.5 or later), available from the Coppermine Photo Gallery Web site at http://coppermine.sourceforge.net
Related URL CVE-2006-1909 (CVE)
Related URL 17570 (SecurityFocus)
Related URL 25866 (ISS)