FreeBSD : coppermine -- 'file' Local File Inclusion Vulnerability (6738977b-e9a5-11da-b9f4-00123ffe8333)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

Coppermine Photo Gallery have a vulnerability, which can be exploited
by malicious people to disclose sensitive information.

Input passed to the 'file' parameter in 'index.php' isn't properly
verified, before it is used to include files. This can be exploited to
include arbitrary files from local resources.

Example : http://[host]/index.php?file=.//././/././/././/./[file]%00

Successful exploitation requires that 'magic_quotes_gpc' is disabled.

See also :

http://coppermine-gallery.net/forum/index.php?topic=30655.0
http://www.nessus.org/u?bcfccc86
http://www.nessus.org/u?dcf286b5

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21586 (freebsd_pkg_6738977be9a511dab9f400123ffe8333.nasl)

Bugtraq ID:

CVE ID: CVE-2006-1909

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now