Click Gallery Multiple Input Validation Vulnerabilities
BID:21311
Info
Click Gallery Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 21311 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Nov 27 2006 12:00AM |
| Updated: | Nov 29 2006 05:29PM |
| Credit: | The Aria-Security Team is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
ClickGallery ClickGallery 0 |
| Not Vulnerable: | |
Discussion
Click Gallery Multiple Input Validation Vulnerabilities
Click Gallery is prone to multiple input-validation vulnerabilities, including SQL-injection issues and a cross-site scripting issue, because the application fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Click Gallery is prone to multiple input-validation vulnerabilities, including SQL-injection issues and a cross-site scripting issue, because the application fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Exploit / POC
Click Gallery Multiple Input Validation Vulnerabilities
An attacker can exploit these issues via a web client.
The following proof-of-concept URIs are available:
http://www.example.com/view_gallery.asp?gallery_id=809¤tpage=[SQL Injection]
http://www.example.com/view_gallery.asp?gallery_id=[SQL injection]
http://www.example.com/download_image.asp?image_id=[SQL Injection]
http://www.example.com/gallery.asp?currentpage=[SQL Injection]
http://www.example.com/view_recent.asp?currentpage=[SQL Injection]
http://www.example.com/gallery.asp?currentpage=2&orderby=[SQL Injection]
An attacker can exploit these issues via a web client.
The following proof-of-concept URIs are available:
http://www.example.com/view_gallery.asp?gallery_id=809¤tpage=[SQL Injection]
http://www.example.com/view_gallery.asp?gallery_id=[SQL injection]
http://www.example.com/download_image.asp?image_id=[SQL Injection]
http://www.example.com/gallery.asp?currentpage=[SQL Injection]
http://www.example.com/view_recent.asp?currentpage=[SQL Injection]
http://www.example.com/gallery.asp?currentpage=2&orderby=[SQL Injection]
Solution / Fix
Click Gallery Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
References
Click Gallery Multiple Input Validation Vulnerabilities
References:
References:
- ClickGallery Web Site (ClickGallery)
- ClickGallery Sql Injection ([email protected])