PhotoPost PHP Pro EXIF Data XSS

medium Nessus Plugin ID 19513

Synopsis

The remote web server contains a PHP application that is prone to a cross-site scripting attack.

Description

According to its banner, the version of PhotoPost PHP Pro installed on the remote web server is prone to script insertion attacks because it does not sanitize malicious EXIF data stored in image files. Using a specially crafted image file, an attacker can exploit this flaw to cause arbitrary HTML and script code to be executed in a user's browser within the context of the affected application.

Solution

Unknown at this time.

See Also

http://cedri.cc/advisories/EXIF_XSS.txt

https://seclists.org/bugtraq/2005/Aug/372

Plugin Details

Severity: Medium

ID: 19513

File Name: photopost_exif_xss.nasl

Version: 1.20

Type: remote

Published: 8/27/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:photopost:photopost_php, cpe:/a:photopost:photopost_php_pro

Required KB Items: www/photopost

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 8/25/2005

Reference Information

CVE: CVE-2005-2737

BID: 14671

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990