header-logo
Suggest Exploit
vendor:
Coppermine Photo Gallery
by:
SecurityFocus
7.5
CVSS
HIGH
PHP Code Injection
78
CWE
Product Name: Coppermine Photo Gallery
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Coppermine Photo Gallery PHP Code Injection Vulnerability

Coppermine Photo Gallery has been reported prone to PHP code injection attacks. Due to a lack of sufficient sanitization performed on user-supplied filenames that are uploaded into the Photo Gallery, an attacker may upload a malicious JPEG. The attacker may craft it in such a way that PHP code execution will occur when the image is viewed. This attack may result in arbitrary PHP code execution in the security context of the web server that is hosting the vulnerable application.

Mitigation:

Ensure that user-supplied filenames are properly sanitized before being uploaded into the Photo Gallery.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7300/info

Coppermine Photo Gallery has been reported prone to PHP code injection attacks.

Due to a lack of sufficient sanitization performed on user-supplied filenames that are uploaded into the Photo Gallery, an attacker may upload a malicious JPEG. The attacker may craft it in such a way that PHP code execution will occur when the image is viewed.

This attack may result in arbitrary PHP code execution in the security context of the web server that is hosting the vulnerable application. 

http://www.example.com/albums/userpics/Copperminer.jpg.php?[command]

Where command can be something like "id;uname%20-a" or "cat%20/etc/passwd"

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22473.tar.gz