Coppermine Photo Gallery index.php path Variable Remote File Inclusion

2007-03-09T23:27:10
ID OSVDB:35069
Type osvdb
Reporter RaeD Hasadya(raed@bsdmail.com)
Modified 2007-03-09T23:27:10

Description

Vulnerability Description

Coppermine Photo Gallery contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to index.php not properly sanitizing user input supplied to the 'path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Coppermine Photo Gallery contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to index.php not properly sanitizing user input supplied to the 'path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Manual Testing Notes

http://[target]/Script_Path/index.php?path=[Shell-Attack]

References:

Related OSVDB ID: 35065 Related OSVDB ID: 35066 Related OSVDB ID: 35068 Related OSVDB ID: 35067 Related OSVDB ID: 35070 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-03/0309.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-03/0068.html Mail List Post: http://attrition.org/pipermail/vim/2007-May/001636.html ISS X-Force ID: 32894 CVE-2007-1414 Bugtraq ID: 22896