Ralf Image Gallery (RIG) 0.7.4 and other versions before 1.0, when register_globals is enabled, allows remote attackers to conduct PHP remote file inclusion and directory traversal attacks via URLs or ".." sequences in the (1) dir_abs_src parameter in (a) check_entry.php, (b) admin_album.php, (c) admin_image.php, and (d) admin_util.php; and the (2) dir_abs_admin_src parameter in admin_album.php and admin_image.php. NOTE: this issue can be leveraged to conduct cross-site scripting (XSS) attacks.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/438645/100/100/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27257 | vdb entry |
http://www.securityfocus.com/bid/18548 | vdb entry |
http://www.securityfocus.com/archive/1/437818/100/0/threaded | mailing list |
http://www.osvdb.org/26753 | vdb entry |
http://rig.powerpulsar.com/#news | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27259 | vdb entry |
http://securityreason.com/securityalert/1136 | third party advisory |
http://www.osvdb.org/26756 | vdb entry |
http://www.osvdb.org/26754 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27256 | vdb entry |
http://www.osvdb.org/26755 | vdb entry |
http://www.majorsecurity.de/advisory/major_rls18.txt | |
http://www.vupen.com/english/advisories/2006/2477 | vdb entry vendor advisory |
http://secunia.com/advisories/20771 | third party advisory patch vendor advisory |