include/imageObjectIM.class.php in Coppermine Photo Gallery (CPG) before 1.4.15, when the ImageMagick picture processing method is configured, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) quality, (2) angle, or (3) clipval parameter to picEditor.php.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.waraxe.us/advisory-65.html | |
http://coppermine-gallery.net/forum/index.php?topic=50103.0 | patch |
http://www.vupen.com/english/advisories/2008/0367 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/27512 | exploit vdb entry patch |
http://secunia.com/advisories/28682 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/487310/100/200/threaded | mailing list |
http://www.securitytracker.com/id?1019286 | vdb entry |
https://www.exploit-db.com/exploits/5019 | exploit |