fkie_cve-2008-3486
Vulnerability from fkie_nvd
Published
2008-08-06 17:41
Modified
2024-11-21 00:49
Severity ?
Summary
Directory traversal vulnerability in the user_get_profile function in include/functions.inc.php in Coppermine Photo Gallery (CPG) 1.4.18 and earlier, when the charset is utf-8, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang part of serialized data in an _data cookie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:*:*:*:*:*:*:*:*", "matchCriteriaId": "18597B1E-61F4-4BBA-90B5-5B5F5BF78B85", "versionEndIncluding": "1.4.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E358276F-157E-4D98-9055-061E6F2F2948", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9A1831F9-4B4A-4226-B219-B3AFF06FFDBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C457C25-AF6B-4F67-BD3B-83361A48CDBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.1:beta_2:*:*:*:*:*:*", "matchCriteriaId": "808B8E20-BE09-4FC2-BC73-2F10261E82B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2003E2A5-A902-45A1-9189-15B956976ECD", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A53D1BF-C884-40F9-9D46-9CCD9ADC183E", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "34A35889-023F-4305-A5A8-F7A8D3409172", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E51F81AC-6AE1-40E5-B2CB-34E1B5985C93", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.1:b:*:*:*:*:*:*", "matchCriteriaId": "8A465AB3-1426-4966-87DF-A1FA3FCCE5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.1:b-nuke:*:*:*:*:*:*", "matchCriteriaId": "E9D7FF03-F2A7-4014-BF17-8393F5220AC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC98C672-0D2E-4A78-A206-CC44A5A6E14E", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4:beta:*:*:*:*:*:*", "matchCriteriaId": "60C520A7-686D-40AB-A41B-EDDF3EC86819", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AFF3F0F-88BF-4EB4-8DCA-4D46D181FCF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.1:beta:*:*:*:*:*:*", "matchCriteriaId": "196B664C-C400-4770-893B-E327D40CD525", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A3BF818D-86E5-4886-9447-FE70CBEAEA0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "B94FCD31-EECA-4323-A63A-554A2AFB3DA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "C1C70B0A-C8C8-449E-A8C4-A595B7404DED", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "E4388EF8-6825-4E8A-B9F2-7D2F69A95865", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "27D59D3A-F55C-4403-BD43-35162EC0E4FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "13B39376-C331-45B5-95AD-C3DD56BBF687", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "FF3DFE45-B65A-46FB-8584-A338143E4F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "15516E4B-8B16-4B81-8881-2E358144BA79", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "ECEE8E75-36D2-4F99-967E-52FDFA150E17", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "B8946662-2C1C-4113-977F-5D7FC3161565", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "C2F59212-9725-4926-9905-28C8C64A3A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "A5FB7773-BBCA-4825-8489-7EE43D6BD312", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "71058CB9-81CA-4F5B-8204-F21C906A71EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "197EF2C1-ADCF-4596-B5A0-689C10720906", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "EB199205-489B-4BB7-81A4-94D45E19349B", "vulnerable": true }, { "criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "BFD299AB-0B18-472B-B99E-C0D585AA21CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the user_get_profile function in include/functions.inc.php in Coppermine Photo Gallery (CPG) 1.4.18 and earlier, when the charset is utf-8, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang part of serialized data in an _data cookie." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en la funci\u00f3n user_get_profile de include/functions.inc.php en Coppermine Photo Gallery (CPG) 1.4.18 y versiones anteriores, cuando el conjunto de caracteres es utf-8, permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n a trav\u00e9s de .. (punto punto) en la parte lang de series de datos en una cookie an_data." } ], "evaluatorImpact": "http://secunia.com/advisories/31295:\r\n\"Successful exploitation requires that \"Character encoding\" is set to \"Unicode (recommended) (utf-8)\", which is the default value.\"", "id": "CVE-2008-3486", "lastModified": "2024-11-21T00:49:21.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-06T17:41:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31295" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4108" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30480" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44133" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/6178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6178" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.