Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Multiple Remote Vulnerabilities in PhotoPost PHP 5.0 RC3 and Older

Vulnerability Assessment Details

Multiple Remote Vulnerabilities in PhotoPost PHP 5.0 RC3 and Older

Vulnerability Assessment Summary
Checks for multiple remote vulnerabilities in PhotoPost PHP 5.0 RC3 and older

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP application that is affected by
several vulnerabilities.

Description :

According to its banner, the version of PhotoPost PHP installed on the
remote host is prone to several remote vulnerabilities:

- An Access Validation Vulnerability.
The 'adm-photo.php' script fails to verify authentication
credentials, which permits a possible hacker to change the
properties of thumbnails of uploaded images.

- A SQL Injection Vulnerability.
The 'uid' parameter in the 'member.php' script is not
properly sanitized before use in SQL queries. An
attacker can leverage this flaw to disclose or modify
sensitive information or perhaps even launch attacks
against the underlying database implementation.

- A Cross-site Scripting (XSS) Vulnerability.
The 'editbio' parameter of the user profile form is not sanitized
properly, permiting a possible hacker to inject arbitrary script or
HTML in a user's browser in the context of the affected web site,
resulting in theft of authentication data or other such attacks.

See also :

Solution :

Upgrade to PhotoPost PHP version 5.01 or later.

Network Security Threat Level:

Medium / CVSS Base Score : 5

Networks Security ID: 12779, 13620

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors


No Discussions have been posted on this vulnerability.