Coppermine Photo Gallery (CPG) 1.4.8 stable, with register_globals enabled, allows remote attackers to bypass XSS protection and set arbitrary variables via a query string that causes the variable to be defined in global space, with separate _GET, _REQUEST, or other critical parameters, which are unset by the protection scheme and prevent the original variable from being detected.
Link | Tags |
---|---|
http://www.osvdb.org/27618 | vdb entry |
http://securityreason.com/securityalert/1914 | third party advisory |
http://archives.neohapsis.com/archives/bugtraq/2006-06/0482.html | mailing list |
http://myimei.com/security/2006-06-20/coppermine-148parameter-cleanup-system-bypassregistering-global-varables.html | |
http://secunia.com/advisories/20597 | third party advisory vendor advisory |
http://svn.sourceforge.net/viewvc/coppermine?view=rev&revision=3133 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27376 | vdb entry |