From 0e8ae2a8022b2361bb447dd7001eb486d3e3cda2 Mon Sep 17 00:00:00 2001 From: mnag Date: Mon, 22 May 2006 15:25:54 +0000 Subject: coppermine -- Multiple File Extensions Vulnerability coppermine -- "file" Local File Inclusion Vulnerability coppermine -- File Inclusion Vulnerabilities --- security/vuxml/vuln.xml | 110 ++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 110 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index feaa04cd8b67..578867a3466f 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,116 @@ Note: Please add new entries to the beginning of this file. --> + + coppermine -- Multiple File Extensions Vulnerability + + + coppermine + 1.4.6 + + + + +

Secunia reports:

+
+

Coppermine Photo Gallery have a vulnerability, which can be + exploited by malicious users to compromise a vulnerable system.

+

The vulnerability is caused due to an error in the handling of + file uploads where a filename has multiple file extensions. This + can be exploited to upload malicious script files inside the web + root (e.g. a PHP script).

+

Successful exploitation may allow execution of script code + depending on the HTTP server configuration (it requires e.g. an + Apache server with the "mod_mime" module installed).

+
+ +
+ + http://sourceforge.net/project/shownotes.php?group_id=89658&release_id=418266 + http://secunia.com/advisories/20211/ + + + 2006-05-22 + 2006-05-22 + +
+ + + coppermine -- "file" Local File Inclusion Vulnerability + + + coppermine + 1.4.5 + + + + +

Secunia reports:

+
+

Coppermine Photo Gallery have a vulnerability, which can be + exploited by malicious people to disclose sensitive + information.

+

Input passed to the "file" parameter in "index.php" isn't properly + verified, before it is used to include files. This can be exploited + to include arbitrary files from local resources.

+

Example: + http://[host]/index.php?file=.//././/././/././/./[file]%00

+

Successful exploitation requires that "magic_quotes_gpc" is + disabled.

+
+ +
+ + CVE-2006-1909 + http://coppermine-gallery.net/forum/index.php?topic=30655.0 + http://myimei.com/security/2006-04-14/copperminephotogallery144-plugininclusionsystemindexphp-remotefileinclusion-attack.html + http://secunia.com/advisories/19665/ + + + 2006-04-19 + 2006-05-22 + +
+ + + coppermine -- File Inclusion Vulnerabilities + + + coppermine + 1.4.4 + + + + +

Secunia reports:

+
+

Coppermine Photo Gallery have a vulnerability, which can be + exploited by malicious people and by malicious users to compromise + a vulnerable system.

+

1) Input passed to the "lang" parameter in include/init.inc.php + isn't properly verified, before it is used to include files. This + can be exploited to include arbitrary files from local resources. + The vulnerability can be further exploited by users who are allowed + to upload image files to execute arbitrary PHP code.

+

2) Input passed to the "f" parameter in docs/showdoc.php isn't + properly verified, before it is used to include files. This can be + exploited to include arbitrary files from local resources on the + Windows platform, and remote files from Windows shared folders.

+
+ +
+ + CVE-2006-0872 + CVE-2006-0873 + http://retrogod.altervista.org/cpg_143_adv.html + http://secunia.com/advisories/18941/ + + + 2006-02-20 + 2006-05-22 + +
+ phpmyadmin -- XSRF vulnerabilities -- cgit