FreeBSD : coppermine -- File Inclusion Vulnerabilities (77cceaef-e9a4-11da-b9f4-00123ffe8333)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

Coppermine Photo Gallery have a vulnerability, which can be exploited
by malicious people and by malicious users to compromise a vulnerable
system.

1) Input passed to the 'lang' parameter in include/init.inc.php isn't
properly verified, before it is used to include files. This can be
exploited to include arbitrary files from local resources. The
vulnerability can be further exploited by users who are allowed to
upload image files to execute arbitrary PHP code.

2) Input passed to the 'f' parameter in docs/showdoc.php isn't
properly verified, before it is used to include files. This can be
exploited to include arbitrary files from local resources on the
Windows platform, and remote files from Windows shared folders.

See also :

http://retrogod.altervista.org/cpg_143_adv.html
http://www.nessus.org/u?6f4ce643

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21587 (freebsd_pkg_77cceaefe9a411dab9f400123ffe8333.nasl)

Bugtraq ID:

CVE ID: CVE-2006-0872
CVE-2006-0873

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now