icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Coppermine Photo Gallery < 1.4.19 data Cookie Local File Inclusion

High

Synopsis

The remote web server contains a PHP application that is affected by a local file inclusion vulnerability.

Description

The version of Coppermine installed on the remote host fails to sanitize input to the 'lang' array element of its data cookie before using it in 'include/init.inc.php' to include PHP code. Provided the application's character set is set to 'utf-8', which is default, an unauthenticated remote attacker can exploit this issue to view arbitrary files or possibly to execute arbitrary PHP code on the remote host subject to the privileges of the web server user ID.

Solution

Upgrade to version 1.4.19 or higher.