vendor:
NP_Gallery
by:
AntiSecurity
8,8
CVSS
HIGH
Remote File Inclusion & SQL Injection
89
CWE
Product Name: NP_Gallery
Affected Version From: 0.94
Affected Version To: 0.94
Patch Exists: YES
Related CWE: N/A
CPE: a:nucleus_cms:np_gallery
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
Nucleus Plugin Gallery RFI & SQLi Vulnerability
NP_Gallery version 0.94 is vulnerable to Remote File Inclusion and SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The malicious request can be sent to the NP_gallery.php file with the DIR_NUCLEUS parameter set to a malicious URL. An attacker can also exploit the SQL Injection vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The malicious request can be sent to the index.php file with the action, name, and type parameters set to plugin, gallery, and album or item respectively. The id parameter can be set to a malicious SQL query.
Mitigation:
Upgrade to the latest version of NP_Gallery and apply the latest security patches.