IMGallery Start.PHP Arbitrary File Upload Vulnerability
BID:21827
Info
IMGallery Start.PHP Arbitrary File Upload Vulnerability
| Bugtraq ID: | 21827 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 30 2006 12:00AM |
| Updated: | Jan 04 2007 06:27PM |
| Credit: | Kacper is credited with the discovery of this vulnerability. |
| Vulnerable: |
IMGallery IMGallery 2.5 |
| Not Vulnerable: | |
Discussion
IMGallery Start.PHP Arbitrary File Upload Vulnerability
IMGallery is prone to an arbitrary file-upload vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue could allow an attacker to upload and execute arbitrary script code in the context of the affected webserver process. This may help the attacker compromise the application; other attacks are possible.
Version 2.5 is vulnerable to this issue; other versions may also be affected.
IMGallery is prone to an arbitrary file-upload vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue could allow an attacker to upload and execute arbitrary script code in the context of the affected webserver process. This may help the attacker compromise the application; other attacks are possible.
Version 2.5 is vulnerable to this issue; other versions may also be affected.
Exploit / POC
IMGallery Start.PHP Arbitrary File Upload Vulnerability
Attackers can exploit this issue via a web client.
The following exploit is available:
Attackers can exploit this issue via a web client.
The following exploit is available:
Solution / Fix
IMGallery Start.PHP Arbitrary File Upload Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].