Simple PHP Scripts Gallery *gallery* File Inclusion

Posted on Wednesday, April 18, 2007 @ 00:37:42 PDT in Security
by raven

SECUNIA ADVISORY ID: SA24912

VERIFY ADVISORY: http://secunia.com/advisories/24912/

CRITICAL: Highly critical

IMPACT: Exposure of system information, Exposure of sensitive information, System access

WHERE: >From remote

SOFTWARE: Simple PHP Scripts Gallery 0.x - http://secunia.com/product/13956/

DESCRIPTION: A vulnerability has been discovered in Simple PHP Scripts Gallery, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.

Input passed to the "gallery" parameter in index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation from external resources (FTP servers) requires that "allow_url_fopen" and "allow_url_include" are enabled, and that the system is running PHP 5. Successful exploitation from local resources requires that "magic_quotes_gpc" is disabled. The vulnerability is confirmed in version 0.3. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: Sek0MirZa and an anonymous person
 
 
click Related        click Share
 
News ©

Site Info v2.2.2

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 361,697,275
  • Today: 17,510
Server InfoServer Info
  • Jul 17, 2018
  • 04:29 am PDT
 
 

Daily Inspiration