Simple PHP Scripts Gallery *gallery* File Inclusion

Posted on Wednesday, April 18, 2007 @ 00:37:42 PDT in Security
by raven



CRITICAL: Highly critical

IMPACT: Exposure of system information, Exposure of sensitive information, System access

WHERE: >From remote

SOFTWARE: Simple PHP Scripts Gallery 0.x -

DESCRIPTION: A vulnerability has been discovered in Simple PHP Scripts Gallery, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.

Input passed to the "gallery" parameter in index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation from external resources (FTP servers) requires that "allow_url_fopen" and "allow_url_include" are enabled, and that the system is running PHP 5. Successful exploitation from local resources requires that "magic_quotes_gpc" is disabled. The vulnerability is confirmed in version 0.3. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: Sek0MirZa and an anonymous person
click Related        click Share
News ©

Site Info v2.2.2

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 370,000,557
  • Today: 47,583
Server InfoServer Info
  • Oct 23, 2018
  • 12:58 pm PDT

Daily Inspiration