[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060513112210.863.qmail@securityfocus.com>
Date: 13 May 2006 11:22:10 -0000
From: doz@...mail.com
To: bugtraq@...urityfocus.com
Subject: Gphotos Directory Traversal and Cross Site Scripting
Details
The first vulnerability issue is due to an input validation error in "index.php" "diapo.php" and "affich.php" scripts that do not validate "rep","image" variables, which may be exploited to cross site scripting attacks.
http://traget/index.php?rep=[xss]
http://traget/diapo.php?rep=[xss]
http://traget/affich.php?image=[xss]
The second flaw is due to an input validation error in the "index.php" script that fails to properly validate "rep" variable, which may be exploited to disclose the contents of arbitrary folders.
http://traget/index.php?rep=../../../
Vulnerable versions
GPhotos 1.5 and prior
Credits
Moroccan Security
Contact
[ Psych0 ] <doz(at)bsdmail(dot)com>
Powered by blists - more mailing lists