SECUNIA ADVISORY ID: SA24912
VERIFY ADVISORY: http://secunia.com/advisories/24912/
CRITICAL: Highly critical
IMPACT: Exposure of system information, Exposure of sensitive information, System access
WHERE: >From remote
SOFTWARE: Simple PHP Scripts Gallery 0.x - http://secunia.com/product/13956/
DESCRIPTION: A vulnerability has been discovered in Simple PHP Scripts Gallery, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.
Input passed to the "gallery" parameter in index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation from external resources (FTP servers) requires that "allow_url_fopen" and "allow_url_include" are enabled, and that the system is running PHP 5. Successful exploitation from local resources requires that "magic_quotes_gpc" is disabled. The vulnerability is confirmed in version 0.3. Other versions may also be affected.
SOLUTION: Edit the source code to ensure that input is properly verified.
PROVIDED AND/OR DISCOVERED BY: Sek0MirZa and an anonymous person
Simple PHP Scripts Gallery *gallery* File InclusionPosted on Wednesday, April 18, 2007 @ 00:37:42 CDT in Security |