Coppermine Photo Gallery showdoc.php f Parameter Local File Inclusion

medium Nessus Plugin ID 20984

Synopsis

The remote web server contains a PHP script that is affected by a remote file include vulnerability.

Description

The installed version of Coppermine Photo Gallery fails to sanitize user input to the 'f' parameter in the 'docs/showdoc.php' script before using it in a PHP 'include()' function. An unauthenticated attacker may be able to exploit this flaw to view arbitrary files or to execute arbitrary PHP code, possibly taken from third-party hosts.

Note that successful exploitation either requires that the remote host be running Windows or that it have some type of Samba share.

Solution

Patch the affected script as recommended in the vendor advisory referenced above.

See Also

http://www.nessus.org/u?2e51ca68

https://www.securityfocus.com/archive/1/425387/30/0/threaded

http://forum.coppermine-gallery.net/index.php?topic=28062.0

Plugin Details

Severity: Medium

ID: 20984

File Name: coppermine_gallery_f_file_include.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 2/27/2006

Updated: 6/1/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/17/2006

Reference Information

CVE: CVE-2006-0873

BID: 16718