Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

Coppermine Photo Gallery f Parameter Remote File Include Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for f parameter remote file include vulnerability in Coppermine Photo Gallery

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP script that is affected by a
remote file include vulnerability.

Description :

The installed version of Coppermine Photo Gallery fails to sanitize
user input to the 'f' parameter in the 'docs/showdoc.php' script
before using it in a PHP 'include()' function. An unauthenticated
attacker may be able to exploit this flaw to view arbitrary files or
to execute arbitrary PHP code, possibly taken from third-party hosts.

Note that successful exploitation either requires that the remote host
be running Windows or that it have some type of Samba share.

See also :

http://retrogod.altervista.org/cpg_143_adv.html
http://www.securityfocus.com/archive/1/425387/30/0/threaded
http://coppermine-gallery.net/forum/index.php?topic=28062.0

Solution :

Patch the affected script as recommended in the vendor advisory
referenced above.

Threat Level:

Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.