Simple One-File Gallery Multiple Input Validation Vulnerabilities
BID:22700
Info
Simple One-File Gallery Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 22700 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1124 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 23 2007 12:00AM |
| Updated: | May 12 2015 07:34PM |
| Credit: | laurent gaffie is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
XeroXer.com Simple one-file gallery 0 |
| Not Vulnerable: | |
Discussion
Simple One-File Gallery Multiple Input Validation Vulnerabilities
Simple one-file gallery is prone to multiple input-validation vulnerabilities, including a local file-include issue and a cross-site scripting issue.
An attacker can exploit these issues to steal cookie-based authentication credentials and to view and execute arbitrary local files within the context of the affected webserver. Other attacks are also possible.
Simple one-file gallery is prone to multiple input-validation vulnerabilities, including a local file-include issue and a cross-site scripting issue.
An attacker can exploit these issues to steal cookie-based authentication credentials and to view and execute arbitrary local files within the context of the affected webserver. Other attacks are also possible.
Exploit / POC
Simple One-File Gallery Multiple Input Validation Vulnerabilities
An attacker can exploit a local file-include vulnerability through a browser. To exploit a cross-site scripting vulnerability, an attacker must entice an unsuspecting victim to follow a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/gallery.php?f=../../../../../../../../../../../../etc/passwd
http://www.example.com/gallery.php?f=[xss]
An attacker can exploit a local file-include vulnerability through a browser. To exploit a cross-site scripting vulnerability, an attacker must entice an unsuspecting victim to follow a malicious URI.
The following proof-of-concept URIs are available:
http://www.example.com/gallery.php?f=../../../../../../../../../../../../etc/passwd
http://www.example.com/gallery.php?f=[xss]
Solution / Fix
Simple One-File Gallery Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Simple One-File Gallery Multiple Input Validation Vulnerabilities
References:
References:
- Simple one-file gallery homepage (XeroXer.com)
- Simple one-file gallery ([email protected])