Ravens PHP Scripts

Coppermine Photo Gallery Two SQL Injection Vulnerabilities
Date: Friday, June 29, 2007 @ 21:10:40 PDT
Topic: Security


SECUNIA ADVISORY ID: SA25846

VERIFY ADVISORY: http://secunia.com/advisories/25846/

CRITICAL: Moderately critical

IMPACT: Manipulation of data, Exposure of sensitive information

WHERE: >From remote

SOFTWARE: Coppermine Photo Gallery 1.x - http://secunia.com/product/1427/

DESCRIPTION: Two vulnerabilities have been reported in Coppermine Photo Gallery, which can be exploited by malicious people and malicious users to conduct SQL injection attacks. The vulnerabilities are reported in version 1.4.10. Prior versions may also be affected.



1) Input passed to the album password cookie in unspecified scripts is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation allows retrieval of unspecified sensitive information.

2) Input passed to the "cat" parameter in albmgr.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation of this vulnerability allows retrieval of usernames and password hashes, but requires valid administrator credentials.

SOLUTION: Update to version 1.4.11.

PROVIDED AND/OR DISCOVERED BY:
1) Reported by the vendor.
2) DarkFig

ORIGINAL ADVISORY:
1) http://coppermine-gallery.net/forum/index.php?topic=44845.0
2) http://milw0rm.com/exploits/3085






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2989