Retired: Coppermine Photo Gallery Multiple Remote File Include Vulnerabilities
BID:22896
Info
Retired: Coppermine Photo Gallery Multiple Remote File Include Vulnerabilities
| Bugtraq ID: | 22896 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1414 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 09 2007 12:00AM |
| Updated: | May 31 2007 08:41PM |
| Credit: | Hasadya Raed is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Coppermine Photo Gallery 1.4.10 |
| Not Vulnerable: | |
Discussion
Retired: Coppermine Photo Gallery Multiple Remote File Include Vulnerabilities
Coppermine Photo Gallery is prone to multiple remote file-include vulnerabilities.
An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
This BID is being retired because further analysis reveals that the application is not vulnerable as described.
Coppermine Photo Gallery is prone to multiple remote file-include vulnerabilities.
An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
This BID is being retired because further analysis reveals that the application is not vulnerable as described.
Exploit / POC
Retired: Coppermine Photo Gallery Multiple Remote File Include Vulnerabilities
Attackers can use a browser to exploit this issue.
Example URIs have been provided:
http://www.example.com/Script_Path/image_processor.php?cmd=[Shell-Attack]
http://www.example.com/Script_Path/include/functions.php?path=[Shell-Attack]
http://www.example.com/Script_Path/include/picmgmt.inc.php?cmd=[Shell-Attack]
http://www.example.com/Script_Path/include/plugin_api.inc.php?path=[Shell-Attack]
http://www.example.com/Script_Path/index.php?path=[Shell-Attack]
http://www.example.com/Script_Path/pluginmgr.php?path=[Shell-Attack]
Attackers can use a browser to exploit this issue.
Example URIs have been provided:
http://www.example.com/Script_Path/image_processor.php?cmd=[Shell-Attack]
http://www.example.com/Script_Path/include/functions.php?path=[Shell-Attack]
http://www.example.com/Script_Path/include/picmgmt.inc.php?cmd=[Shell-Attack]
http://www.example.com/Script_Path/include/plugin_api.inc.php?path=[Shell-Attack]
http://www.example.com/Script_Path/index.php?path=[Shell-Attack]
http://www.example.com/Script_Path/pluginmgr.php?path=[Shell-Attack]
Solution / Fix
Retired: Coppermine Photo Gallery Multiple Remote File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
References
Retired: Coppermine Photo Gallery Multiple Remote File Include Vulnerabilities
References:
References:
- Coppermine Photo Gallery Homepage (Coppermine Photo Gallery)
- Remote File Include In Script Coppermine Photo Gallery ('RaeD Hasadya'
)