Family: CGI abuses --> Category: attack
Coppermine Photo Gallery f Parameter Remote File Include Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for f parameter remote file include vulnerability in Coppermine Photo Gallery
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP script that is affected by a
remote file include vulnerability.
The installed version of Coppermine Photo Gallery fails to sanitize
user input to the 'f' parameter in the 'docs/showdoc.php' script
before using it in a PHP 'include()' function. An unauthenticated
attacker may be able to exploit this flaw to view arbitrary files or
to execute arbitrary PHP code, possibly taken from third-party hosts.
Note that successful exploitation either requires that the remote host
be running Windows or that it have some type of Samba share.
See also :
Patch the affected script as recommended in the vendor advisory
Low / CVSS Base Score : 2.3
Click HERE for more information and discussions on this network vulnerability scan.