Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 130277 - www-apps/coppermine possible remote file inclusion
Summary: www-apps/coppermine possible remote file inclusion
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High trivial
Assignee: Gentoo Security
URL: http://myimei.com/security/2006-04-14...
Whiteboard: ~3? [noglsa] DerCorny
Keywords:
Depends on:
Blocks:
 
Reported: 2006-04-17 10:43 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2006-04-24 06:16 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-04-17 10:43:59 UTC
Software: CPG Coppermine Photo Gallery
 Sowtware’s Web Site: http://coppermine.sourceforge.net/
 Versions: 1.4.4.stable
 Class: Remote
 Status: Unpatched
 Exploit: Available
 Solution: Not Available
 Discovered by: imei addmimistrator
 Risk Level: High
 —————–Description—————
 There is a security flaw in Coppermine Photo Gallery, one of popular photo galleries in internet, that allows attacker perform a Remote File inclusion attack.

 bug is in a security flaw in plugin inclusion system.this system do not propely validate parameter $_GET[’file’] and have a simple removing speacial char mechanism that is evasionable easy.
 ————–See Also——————
 file:{index.php}39
 $file = str_replace(’//’,'’,str_replace(’..’,'’,$_GET[’file’]));
 $path = ‘./plugins/’.$file.’.php’;
// Don’t include the codebase and credits files
 if ($file != ‘codebase’ && $file != ‘configuration’ && file_exists($path)) {
// Include the code from the plugin
 include_once($path);
 $file = true;
 }
————–Exploit———————-
 /cpg/index.php?file=.//././/././/././/././/././/././/././/././/./etc/passwd%00
 ————–Credit———————–
 Discovered by: imei addmimistrator
 addmimistrator(4}gmail(O}com
 imei(4}Kapda(O}IR
 www.myimei.com
 myimei.com/security
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2006-04-19 08:40:25 UTC
stuart pls bump, thank you
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2006-04-22 03:35:22 UTC
1.4.5 is out to fix this directory traversal attack
Comment 3 Renat Lumpau (RETIRED) gentoo-dev 2006-04-24 06:03:43 UTC
in CVS