vendor:
CS_Gallery
by:
burncycle
N/A
CVSS
HIGH
File Inclusion
98
CWE
Product Name: CS_Gallery
Affected Version From: CS_Gallery version 2.0 and below
Affected Version To: CS_Gallery version 2.0
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2007
File Inclusion Exploit for CS_Gallery <= 2.0
This is a file inclusion exploit for CS_Gallery version 2.0 and below. The vulnerability allows an attacker to include arbitrary files on the target server. The exploit works by manipulating the 'index.php' file of the CS_Gallery script. The vulnerable code snippet is shown in the comments of the exploit. This exploit requires the target server to have the cURL extension of PHP installed and the PHP settings 'allow_url_fopen' and 'allow_url_include' to be set to 'On'. The exploit script takes two arguments - the path to the CS_Gallery script and the path to the shell file to be included. It also supports an optional proxy.
Mitigation:
To mitigate this vulnerability, the vendor should release a patch that fixes the file inclusion vulnerability in the 'index.php' file. Additionally, it is recommended to disable the 'allow_url_fopen' and 'allow_url_include' PHP settings on the server.