vendor:
Coppermine Photo Gallery
by:
Janek Vind 'waraxe'
7.5
CVSS
HIGH
Remote Shell Command Execution
N/A
CWE
Product Name: Coppermine Photo Gallery
Affected Version From: Coppermine 1.4.14
Affected Version To: Coppermine 1.4.14
Patch Exists: YES
Related CWE: N/A
CPE: a:coppermine:coppermine_photo_gallery:1.4.14
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: IIS, Apache 1.3.24 onwards to the latest Apache 2, on Linux, UNIX, OSX, and Win32 systems.
2008
Remote Shell Command Execution in Coppermine 1.4.14
An attacker is able to execute arbitrary shell commands with the privileges of the web server process, such as user 'nobody','apache' or 'www'. This is caused by unsanitized user-submitted POST variables 'quality', 'angle' and 'clipval' in the function 'rotateImage' in 'include/imageObjectIM.class.php'.
Mitigation:
Upgrade to Coppermine 1.4.15 or newer.