[UNIX] GPhotos Multiple Vulnerabilities
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 19 Nov 2006 15:04:31 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
GPhotos Multiple Vulnerabilities
<http://www.comscripts.com/scripts/php.gphotos.1593.html> GPhotos is "a
PHP based photo gallery". The GPhotos product has been found to contain
multiple vulnerabilities allowing attacker to disclose sensitive
information on directories and files residing on the remote system as well
* GPhotos version 1.5
Cross Site Scripting:
User provided input passed to the "rep" parameter in "index.php" and
"diapo.php", and the "image" parameter in "affich.php" allows remote
attackers to include arbitrary content into the web page returned by the
User provided input passed to the "rep" parameter in "index.php" allows
remote attackers to access files and directories that reside outside the
web server's default path by utilizing a simple "../" attack.
The information has been provided by <mailto:tux025@xxxxxxxxx> tux025.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [EXPL] Oxygen SQL Injection (Exploit, O2PHP)
- Next by Date: [EXPL] Windows WorkStation NetpManageIPCConnect (MS06-070, Exploit)
- Previous by thread: [EXPL] Oxygen SQL Injection (Exploit, O2PHP)
- Next by thread: [EXPL] Windows WorkStation NetpManageIPCConnect (MS06-070, Exploit)