[UNIX] GPhotos Multiple Vulnerabilities

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.

- - - - - - - - -

GPhotos Multiple Vulnerabilities


<http://www.comscripts.com/scripts/php.gphotos.1593.html> GPhotos is "a
PHP based photo gallery". The GPhotos product has been found to contain
multiple vulnerabilities allowing attacker to disclose sensitive
information on directories and files residing on the remote system as well
as allow attackers to insert arbitrary HTML and/or JavaScript.


Vulnerable Systems:
* GPhotos version 1.5

Cross Site Scripting:
User provided input passed to the "rep" parameter in "index.php" and
"diapo.php", and the "image" parameter in "affich.php" allows remote
attackers to include arbitrary content into the web page returned by the

Directory Traversal:
User provided input passed to the "rep" parameter in "index.php" allows
remote attackers to access files and directories that reside outside the
web server's default path by utilizing a simple "../" attack.


The information has been provided by <mailto:tux025@xxxxxxxxx> tux025.


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.