Vulnerabilities > CVE-2006-0873 - File Include vulnerability in Coppermine Photo Gallery 1.4.3

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
coppermine
nessus

Summary

Absolute path traversal vulnerability in docs/showdocs.php in Coppermine Photo Gallery 1.4.3 and earlier allows remote attackers to include arbitrary files via the f parameter, and possibly remote files using UNC share pathnames.

Vulnerable Configurations

Part Description Count
Application
Coppermine
1

Nessus

  • NASL familyCGI abuses
    NASL idCOPPERMINE_GALLERY_F_FILE_INCLUDE.NASL
    descriptionThe installed version of Coppermine Photo Gallery fails to sanitize user input to the
    last seen2020-06-01
    modified2020-06-02
    plugin id20984
    published2006-02-27
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20984
    titleCoppermine Photo Gallery showdoc.php f Parameter Local File Inclusion
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description) {
      script_id(20984);
      script_version("1.16");
    
      script_cve_id("CVE-2006-0873");
      script_bugtraq_id(16718);
    
      script_name(english:"Coppermine Photo Gallery showdoc.php f Parameter Local File Inclusion");
      script_summary(english:"Checks for f parameter remote file include vulnerability in Coppermine Photo Gallery");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote web server contains a PHP script that is affected by a
    remote file include vulnerability." );
     script_set_attribute(attribute:"description", value:
    "The installed version of Coppermine Photo Gallery fails to sanitize
    user input to the 'f' parameter in the 'docs/showdoc.php' script
    before using it in a PHP 'include()' function.  An unauthenticated
    attacker may be able to exploit this flaw to view arbitrary files or
    to execute arbitrary PHP code, possibly taken from third-party hosts. 
    
    Note that successful exploitation either requires that the remote host
    be running Windows or that it have some type of Samba share." );
     # https://web.archive.org/web/20060418091554/http://retrogod.altervista.org/cpg_143_adv.html
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2e51ca68" );
     script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/425387/30/0/threaded" );
     script_set_attribute(attribute:"see_also", value:"http://forum.coppermine-gallery.net/index.php?topic=28062.0" );
     script_set_attribute(attribute:"solution", value:
    "Patch the affected script as recommended in the vendor advisory
    referenced above." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:W/RC:ND");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/02/27");
     script_set_attribute(attribute:"vuln_publication_date", value: "2006/02/17");
     script_cvs_date("Date: 2018/11/15 20:50:16");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_end_attributes();
    
    
      script_category(ACT_ATTACK);
      script_family(english:"CGI abuses");
    
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
    
      script_dependencies("coppermine_gallery_detect.nasl");
      script_exclude_keys("Settings/disable_cgi_scanning");
      script_require_ports("Services/www", 80);
      script_require_keys("www/PHP");
      exit(0);
    }
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    
    port = get_http_port(default:80, embedded: 0);
    if (!can_host_php(port:port)) exit(0);
    
    
    # Test an install.
    install = get_kb_item(string("www/", port, "/coppermine_photo_gallery"));
    if (isnull(install)) exit(0);
    matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
    if (!isnull(matches)) {
      dir = matches[2];
    
      # Try to exploit the flaw to read a file in the directory.
      #
      # nb: the vendor patch always displays 'index.htm' so the caller
      #     can't request another file.
      file = 'COPYING';
      r = http_send_recv3(method:"GET", port: port,
        item:string(dir, "/docs/showdoc.php?",
          "f=", file));
      if (isnull(r)) exit(0);
      res = r[2];
    
      # There's a problem if it looks like the GPL.
      if ("GNU GENERAL PUBLIC LICENSE" >< res) {
        security_warning(port);
        exit(0);
      }
    }
    
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_77CCEAEFE9A411DAB9F400123FFE8333.NASL
    descriptionSecunia reports : Coppermine Photo Gallery have a vulnerability, which can be exploited by malicious people and by malicious users to compromise a vulnerable system. 1) Input passed to the
    last seen2020-06-01
    modified2020-06-02
    plugin id21587
    published2006-05-23
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21587
    titleFreeBSD : coppermine -- File Inclusion Vulnerabilities (77cceaef-e9a4-11da-b9f4-00123ffe8333)