Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PhotoPost Multiple Input Validation Vulnerabilities


Vulnerability Assessment Details

PhotoPost Multiple Input Validation Vulnerabilities

Vulnerability Assessment Summary
Checks for multiple input validation vulnerabilities in PhotoPost PHP

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP application that is affected by
several vulnerabilities.

Description :

The version of PhotoPost PHP installed on the remote host is prone to
multiple input validation vulnerabilities:

o Multiple SQL Injection Vulnerabilities
The application fails to properly sanitize user-input via
the 'sl' parameter of the 'showmembers.php' script, and
the 'photo' parameter of the 'showphoto.php' script. An
attacker can exploit these flaws to manipulate SQL
queries, possibly destroying or revealing sensitive data.

o Multiple Cross-Site Scripting Vulnerabilities
The application fails to properly sanitize user-input via
the 'photo' parameter of the 'slideshow.php' script, the
'cat', 'password', 'si', 'ppuser', and 'sort' parameters
of the 'showgallery.php' script, and the 'ppuser', 'sort',
and 'si' parameters of the 'showmembers.php' script.
A possible hacker can exploit these flaws to inject arbitrary
HTML or code script in a user's browser in the context of
the affected web site, resulting in theft of
authentication data or other such attacks.

See also :

http://archives.neohapsis.com/archives/bugtraq/2005-03/0471.html

Solution :

The issues are reportedly fixed by upgrading to PhotoPost PHP version
5.1.

Network Security Threat Level:

Medium / CVSS Base Score : 5
(AV:R/AC:L/Au:NR/C:P/A:N/I:P/B:N)

Networks Security ID: 12920

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

Cisco Asa5520-Bun-K9
$89.0
Cisco Asa5520-Bun-K9 pictureGenuine Cisco SFP-H10GB-CU3M -10GBASE-CU -SFP+ Cable - 3 Meters - FACTORY SEALED
$15.6
Genuine Cisco SFP-H10GB-CU3M -10GBASE-CU -SFP+ Cable - 3 Meters - FACTORY SEALED pictureNew Sealed Cisco Aironet AIR-SAP2602I-A-K9 2600i Access Point 802.11a/g/n
$1.0
New Sealed Cisco Aironet AIR-SAP2602I-A-K9 2600i Access Point 802.11a/g/n pictureNEW LINKSYS CISCO Wireless-G WMP54G Desktop PCI Network Adapter 54Mbps
$12.5
NEW LINKSYS CISCO Wireless-G WMP54G Desktop PCI Network Adapter 54Mbps  picture


Discussions

No Discussions have been posted on this vulnerability.