Ravens PHP Scripts

Simple PHP Scripts Gallery *gallery* File Inclusion
Date: Wednesday, April 18, 2007 @ 01:37:42 CEST
Topic: Security


VERIFY ADVISORY: http://secunia.com/advisories/24912/

CRITICAL: Highly critical

IMPACT: Exposure of system information, Exposure of sensitive information, System access

WHERE: >From remote

SOFTWARE: Simple PHP Scripts Gallery 0.x - http://secunia.com/product/13956/

DESCRIPTION: A vulnerability has been discovered in Simple PHP Scripts Gallery, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.

Input passed to the "gallery" parameter in index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation from external resources (FTP servers) requires that "allow_url_fopen" and "allow_url_include" are enabled, and that the system is running PHP 5. Successful exploitation from local resources requires that "magic_quotes_gpc" is disabled. The vulnerability is confirmed in version 0.3. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: Sek0MirZa and an anonymous person

This article comes from Ravens PHP Scripts

The URL for this story is: