Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> TrueGalerie admin access


Vulnerability Assessment Details

TrueGalerie admin access

Vulnerability Assessment Summary
logs into the remote TrueGalerie installation

Detailed Explanation for this Vulnerability Assessment

The remote host is running TrueGalerie, an album management system
written in PHP.

There is a flaw in the version of TrueGalerie which may permit a possible hacker
to log in as the administrator without having to know the password, simply
by requesting the URL :
/admin.php?loggedin=1


A possible hacker may use this flaw to gain administrative rights on
this web server and modify its content.

Solution : Disable the option 'register_globals' in php.ini or replace
this set of CGI by something else
Network Security Threat Level: High

Networks Security ID: 7427

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison

Cables, Connectors

Intel Core i5-2520M SR048 2.5GHz Dual Core Mobile Processor. #C 158
$12.99
Intel Core i5-2520M SR048 2.5GHz Dual Core Mobile Processor. #C 158 pictureIntel Core i5-3470S 2.9GHz Quad-Core (CM8063701094000) Processor
$19.95
Intel Core i5-3470S 2.9GHz Quad-Core (CM8063701094000) Processor pictureAMD Turion 64 X2 TL-58 TL 58 TL58 1.9 GHz Dual-Core CPU Processor Socket S1
$10.0
AMD Turion 64 X2 TL-58 TL 58 TL58 1.9 GHz Dual-Core CPU Processor Socket S1 pictureAcer Predator Ag3-710-uw11 Desktop PC With Intel Core I5-6400 Processor 8gb...
$480.0
Acer Predator Ag3-710-uw11 Desktop PC With Intel Core I5-6400 Processor 8gb... picture


Discussions

No Discussions have been posted on this vulnerability.