vendor:
mod_gallery
by:
Eugene Minaev
7.5
CVSS
HIGH
Remote File Inclusion (RFI)
CWE
Product Name: mod_gallery
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2007
XOOPS mod_gallery Zend_Hash_key + Extract RFI
The XOOPS mod_gallery module is vulnerable to a remote file inclusion (RFI) attack. This vulnerability occurs when the application fails to properly sanitize user-supplied input, allowing an attacker to include a remote file from a malicious server. The vulnerability can be exploited when the register_globals setting is turned off. The vulnerability is caused by the insecure handling of user-supplied input in the GALLERY_BASEDIR parameter. An attacker can manipulate this parameter to include a remote file, resulting in arbitrary code execution on the server. The vulnerability was discovered by Eugene Minaev of ITDefence.ru.
Mitigation:
To mitigate this vulnerability, it is recommended to update the XOOPS mod_gallery module to a patched version that properly sanitizes user-supplied input. Additionally, enabling the register_globals setting or using a web application firewall can help prevent this type of attack.