Vulnerabilities > CVE-2006-0873 - Unspecified vulnerability in Coppermine Photo Gallery 1.4.3

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
coppermine
nessus

Summary

Absolute path traversal vulnerability in docs/showdocs.php in Coppermine Photo Gallery 1.4.3 and earlier allows remote attackers to include arbitrary files via the f parameter, and possibly remote files using UNC share pathnames.

Vulnerable Configurations

Part Description Count
Application
Coppermine
1

Nessus

  • NASL familyCGI abuses
    NASL idCOPPERMINE_GALLERY_F_FILE_INCLUDE.NASL
    descriptionThe installed version of Coppermine Photo Gallery fails to sanitize user input to the
    last seen2020-06-01
    modified2020-06-02
    plugin id20984
    published2006-02-27
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20984
    titleCoppermine Photo Gallery showdoc.php f Parameter Local File Inclusion
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description) {
      script_id(20984);
      script_version("1.16");
    
      script_cve_id("CVE-2006-0873");
      script_bugtraq_id(16718);
    
      script_name(english:"Coppermine Photo Gallery showdoc.php f Parameter Local File Inclusion");
      script_summary(english:"Checks for f parameter remote file include vulnerability in Coppermine Photo Gallery");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote web server contains a PHP script that is affected by a
    remote file include vulnerability." );
     script_set_attribute(attribute:"description", value:
    "The installed version of Coppermine Photo Gallery fails to sanitize
    user input to the 'f' parameter in the 'docs/showdoc.php' script
    before using it in a PHP 'include()' function.  An unauthenticated
    attacker may be able to exploit this flaw to view arbitrary files or
    to execute arbitrary PHP code, possibly taken from third-party hosts. 
    
    Note that successful exploitation either requires that the remote host
    be running Windows or that it have some type of Samba share." );
     # https://web.archive.org/web/20060418091554/http://retrogod.altervista.org/cpg_143_adv.html
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2e51ca68" );
     script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/425387/30/0/threaded" );
     script_set_attribute(attribute:"see_also", value:"http://forum.coppermine-gallery.net/index.php?topic=28062.0" );
     script_set_attribute(attribute:"solution", value:
    "Patch the affected script as recommended in the vendor advisory
    referenced above." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:W/RC:ND");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/02/27");
     script_set_attribute(attribute:"vuln_publication_date", value: "2006/02/17");
     script_cvs_date("Date: 2018/11/15 20:50:16");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_end_attributes();
    
    
      script_category(ACT_ATTACK);
      script_family(english:"CGI abuses");
    
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
    
      script_dependencies("coppermine_gallery_detect.nasl");
      script_exclude_keys("Settings/disable_cgi_scanning");
      script_require_ports("Services/www", 80);
      script_require_keys("www/PHP");
      exit(0);
    }
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    
    port = get_http_port(default:80, embedded: 0);
    if (!can_host_php(port:port)) exit(0);
    
    
    # Test an install.
    install = get_kb_item(string("www/", port, "/coppermine_photo_gallery"));
    if (isnull(install)) exit(0);
    matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
    if (!isnull(matches)) {
      dir = matches[2];
    
      # Try to exploit the flaw to read a file in the directory.
      #
      # nb: the vendor patch always displays 'index.htm' so the caller
      #     can't request another file.
      file = 'COPYING';
      r = http_send_recv3(method:"GET", port: port,
        item:string(dir, "/docs/showdoc.php?",
          "f=", file));
      if (isnull(r)) exit(0);
      res = r[2];
    
      # There's a problem if it looks like the GPL.
      if ("GNU GENERAL PUBLIC LICENSE" >< res) {
        security_warning(port);
        exit(0);
      }
    }
    
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_77CCEAEFE9A411DAB9F400123FFE8333.NASL
    descriptionSecunia reports : Coppermine Photo Gallery have a vulnerability, which can be exploited by malicious people and by malicious users to compromise a vulnerable system. 1) Input passed to the
    last seen2020-06-01
    modified2020-06-02
    plugin id21587
    published2006-05-23
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21587
    titleFreeBSD : coppermine -- File Inclusion Vulnerabilities (77cceaef-e9a4-11da-b9f4-00123ffe8333)