Vulnerabilities > CVE-2005-0776 - Remote vulnerability in Photopost PHP PRO 5.0Rc3

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
photopost
nessus
exploit available

Summary

adm-photo.php in PhotoPost PHP 5.0 RC3 does not properly verify administrative privileges before manipulating photos, which could allow remote attackers to manipulate other users' photos.

Vulnerable Configurations

Part Description Count
Application
Photopost
1

Exploit-Db

descriptionAll Enthusiast PhotoPost PHP Pro 5.0 adm-photo.php Arbitrary Image Manipulation. CVE-2005-0776 . Webapps exploit for php platform
idEDB-ID:25208
last seen2016-02-03
modified2005-03-10
published2005-03-10
reporterIgor Franchuk
sourcehttps://www.exploit-db.com/download/25208/
titleAll Enthusiast PhotoPost PHP Pro 5.0 adm-photo.php Arbitrary Image Manipulation

Nessus

NASL familyCGI abuses
NASL idPHOTOPOST_MULTIPLE_VULNS.NASL
descriptionAccording to its banner, the version of PhotoPost PHP installed on the remote host has several vulnerabilities: - An Access Validation Vulnerability. The
last seen2020-06-01
modified2020-06-02
plugin id17314
published2005-03-11
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17314
titlePhotoPost PHP < 5.0.1 Multiple Remote Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(17314);
  script_version("1.23");
  script_cvs_date("Date: 2018/11/15 20:50:18");

  script_cve_id("CVE-2005-0774", "CVE-2005-0775", "CVE-2005-0776", "CVE-2005-0777", "CVE-2005-0778", "CVE-2005-1629");
  script_bugtraq_id(12779, 13620);

  script_name(english:"PhotoPost PHP < 5.0.1 Multiple Remote Vulnerabilities");
  script_summary(english:"Checks for multiple remote vulnerabilities in PhotoPost PHP 5.0 RC3 and older");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is affected by
several vulnerabilities." );
  script_set_attribute(attribute:"description", value:
"According to its banner, the version of PhotoPost PHP installed on the
remote host has several vulnerabilities:

  - An Access Validation Vulnerability.
    The 'adm-photo.php' script fails to verify authentication
    credentials, which allows an attacker to change the 
    properties of thumbnails of uploaded images.

  - A SQL Injection Vulnerability.
    The 'uid' parameter in the 'member.php' script is not 
    properly sanitized before use in SQL queries. An
    attacker can leverage this flaw to disclose or modify
    sensitive information or perhaps even launch attacks
    against the underlying database implementation.

  - A Cross-site Scripting (XSS) Vulnerability.
    The 'editbio' parameter of the user profile form is not sanitized
    properly, allowing an attacker to inject arbitrary script or
    HTML in a user's browser in the context of the affected website, 
    resulting in theft of authentication data or other such attacks." );
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2005/Mar/213" );
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2005/May/311" );
  script_set_attribute(attribute:"solution", value:
"Upgrade to PhotoPost PHP version 5.01 or later." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"plugin_publication_date", value: "2005/03/11");
  script_set_attribute(attribute:"vuln_publication_date", value: "2005/03/11");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:photopost:photopost_php");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:photopost:photopost_php_pro");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");

  script_dependencies("photopost_detect.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);
  script_require_keys("www/photopost");
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(0);


# Test an install.
install = get_kb_item(string("www/", port, "/photopost"));
if (isnull(install)) exit(0);
matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (!isnull(matches)) {
  ver = matches[1];

  if (ver =~ "^[0-4].*|5\.0[^0-9]?|5\.0rc[123]$")
  {
   security_hole(port);
   set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
   set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
  }
}