PhotoPost Multiple Vulnerabilities
PhotoPost is prone to cross site scripting in several different scripts throughout the application. Below are examples: http://path/showgallery.php?cat=[INT]&page=[XSS], http://path/showgallery.php?si=[XSS], http://path/showgallery.php?cat=[INT][XSS], http://path/showgallery.php?ppuser=[INT]&cat=[INT][XSS]. This can be used to render hostile code in the context of the victims browser, or to steal cookie based credentials or other sensitive info. There are several SQL Injection vulnerabilities in this application. Some are easy to exploit, others are not so easy. http://path/showgallery.php?cat=[INT][SQL], http://path/showgallery.php?ppuser=[INT][SQL]&cat=[INT]. These SQL issues can possibly be exploited to influence SQL queries and disclose arbitrary data. These will alse cause XSS if unsuccessful.