what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

KAPDA-48.txt

KAPDA-48.txt
Posted Jun 14, 2006
Site KAPDA.ir

[KAPDA::48] CopperminePhotoGallery 1.4.8.stable suffer from a SQL injection vulnerability.

tags | advisory, sql injection
SHA-256 | 90a2a4f42692f300590ee2c1c95bf22b8f9125457f74592ab00dbec78d285e26

KAPDA-48.txt

Change Mirror Download
[ORIGINAL ADVISORY:]
http://myimei.com/security/2006-06-11/copperminephotogallery148-addhit-function-sqlinjection-attack.html
HTTP://KAPDA.IR


——-Summary——-
Software: CPG Coppermine Photo Gallery
Software’s Web Site: http://coppermine.sourceforge.net/
Versions: 1.4.8.stable
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Available
Discovered by: imei addmimistrator
Risk Level: Mediume-High
——-Description——-
There is a security flaw in Coppermine Photo Gallery, one of popular photo galleries in internet, that allows attacker perform an SQL INJECTION attack .

Cause of trust to user?s suplied data { user agent and refferer url}, that can have qoutations, malicious people can execute sql commands in process of viewing a picture or probabley other process that gallery provides.
??-See Also??-
include/function.inc.php
function add_hit;
$query = ?INSERT INTO {$CONFIG[?TABLE_HIT_STATS?]}
SET
pid = $pid,
search_phrase = ?$query_term?,
Ip = ?$_SERVER[REMOTE_ADDR]?,
sdate = ?$time?,
referer=?$_SERVER[HTTP_REFERER]?,
browser = ?$browser?,
os = ?$os??;
cpg_db_query($query);
both of marked lines can exploit.
??-Conditions??-
$CONFIG[?hit_details?] should be true. {meet settings of gallery in admin area}
??-Exploit??-
GET /cpg/displayimage.php?album=random&cat=0&pos=-{Not Viewd Image ID} HTTP/1.1
Host: O_O
User-Agent: ?sql commands
Keep-Alive: 300
Cookie: valid login
??-Credit???
Discovered by: imei addmimistrator
addmimistrator(4}gmail(O}com
imei(4}Kapda(O}IR
www.myimei.com
myimei.com/security

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close