|
Family: CGI abuses : XSS --> Category: infos
Gallery EXIF Data Script Insertion Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for EXIF data script insertion vulnerability in Gallery
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is susceptible
to a cross-site scripting attack.
Description :
The remote host is running Gallery, a web-based photo album.
According to its banner, the version of Gallery installed on the
remote host is prone to script insertion attacks because it does not
sanitize malicious EXIF data stored in image files. Using a
specially-crafted image file, a possible hacker can exploit this flaw to
cause arbitrary HTML and script code to be executed in a user's
browser within the context of the affected application.
See also :
http://cedri.cc/advisories/EXIF_XSS.txt
http://archives.neohapsis.com/archives/bugtraq/2005-08/0374.html
http://sourceforge.net/project/shownotes.php?release_id=352576
Solution :
Upgrade to Gallery 1.5.1 or later.
Threat Level:
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:N/A:N/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|