header-logo
Suggest Exploit
vendor:
Simple one-file gallery
by:
7.5
CVSS
HIGH
Input-validation vulnerabilities
79
CWE
Product Name: Simple one-file gallery
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Multiple input-validation vulnerabilities in Simple one-file gallery

Simple one-file gallery is prone to multiple input-validation vulnerabilities, including a local file-include issue and a cross-site scripting issue. An attacker can exploit these issues to steal cookie-based authentication credentials and to view and execute arbitrary local files within the context of the affected webserver. Other attacks are also possible.

Mitigation:

It is recommended to update to the latest version of Simple one-file gallery or switch to a different gallery software that is actively maintained and regularly patched.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22700/info
 
Simple one-file gallery is prone to multiple input-validation vulnerabilities, including a local file-include issue and a cross-site scripting issue.
 
An attacker can exploit these issues to steal cookie-based authentication credentials and to view and execute arbitrary local files within the context of the affected webserver. Other attacks are also possible.
 
http://www.example.com/gallery.php?f=[xss]