PhotoPost Pro File Extension Spoofing Code Execution

2005-03-11T05:40:19
ID OSVDB:14683
Type osvdb
Reporter Igor Franchuk(sprog@online.ru)
Modified 2005-03-11T05:40:19

Description

Vulnerability Description

PhotoPost Pro contains a flaw that may allow a remote attacker to execute arbitrary code. The problem is that the application does not properly verify whether an uploaded file is an image file or not. It is possible that the flaw may allow a remote attacker to inject arbitrary Javascript by uploading a file with a spoofed image extension (.gif, .jpg) resulting in a loss of integrity.

Solution Description

Upgrade to version 5.01 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

PhotoPost Pro contains a flaw that may allow a remote attacker to execute arbitrary code. The problem is that the application does not properly verify whether an uploaded file is an image file or not. It is possible that the flaw may allow a remote attacker to inject arbitrary Javascript by uploading a file with a spoofed image extension (.gif, .jpg) resulting in a loss of integrity.

References:

Vendor URL: http://www.photopost.com/ Secunia Advisory ID:14576 Related OSVDB ID: 14679 Related OSVDB ID: 14680 Related OSVDB ID: 14681 Related OSVDB ID: 14682 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-03/0200.html ISS X-Force ID: 19679 CVE-2005-0778 Bugtraq ID: 12779