|
Family: CGI abuses : XSS --> Category: infos
phpGraphy EXIF Data Script Insertion Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for EXIF data script insertion vulnerability in phpGraphy
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is affected by a
cross-site scripting issue.
Description :
The remote host is running phpGraphy, a web-based photo album.
According to its banner, the version of phpGraphy installed on the
remote host is prone to script insertion attacks because it does not
sanitize malicious EXIF data stored in image files. Using a
specially-crafted image file, a possible hacker can exploit this flaw to
cause arbitrary HTML and script code to be executed in a user's
browser within the context of the affected application.
See also :
http://cedri.cc/advisories/EXIF_XSS.txt
http://archives.neohapsis.com/archives/bugtraq/2005-08/0374.html
Solution :
While we are unaware of any public statement from the project,
upgrading to phpGraphy 0.9.10 or later is reported to address the
issue.
Threat Level:
Low / CVSS Base Score : 1
(AV:R/AC:H/Au:R/C:N/A:N/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|