Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for multiple remote vulnerabilities in PhotoPost PHP 5.0 RC3 and older
Detailed Explanation for this Vulnerability Assessment
The remote web server contains a PHP application that is affected by
According to its banner, the version of PhotoPost PHP installed on the
remote host is prone to several remote vulnerabilities:
- An Access Validation Vulnerability.
The 'adm-photo.php' script fails to verify authentication
credentials, which permits a possible hacker to change the
properties of thumbnails of uploaded images.
- A SQL Injection Vulnerability.
The 'uid' parameter in the 'member.php' script is not
properly sanitized before use in SQL queries. An
attacker can leverage this flaw to disclose or modify
sensitive information or perhaps even launch attacks
against the underlying database implementation.
- A Cross-site Scripting (XSS) Vulnerability.
The 'editbio' parameter of the user profile form is not sanitized
properly, permiting a possible hacker to inject arbitrary script or
HTML in a user's browser in the context of the affected web site,
resulting in theft of authentication data or other such attacks.
See also :
Upgrade to PhotoPost PHP version 5.01 or later.
Network Security Threat Level:
Medium / CVSS Base Score : 5
Networks Security ID: 12779, 13620
Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security
No Discussions have been posted on this vulnerability.