Coppermine Photo Gallery before 1.5.20 allows remote attackers to obtain sensitive information via (1) a direct request to plugins/visiblehookpoints/index.php, an invalid (2) page or (3) cat parameter to thumbnails.php, an invalid (4) page parameter to usermgr.php, or an invalid (5) newer_than or (6) older_than parameter to search.inc.php, which reveals the installation path in an error message.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-03/0167.html | exploit mailing list |
http://www.waraxe.us/advisory-81.html | exploit |
http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html | exploit |
http://www.exploit-db.com/exploits/18680 | exploit |
http://osvdb.org/80734 | vdb entry exploit |
http://osvdb.org/80735 | vdb entry exploit |
http://coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.6.x/edit_one_pic.php?r1=8348&r2=8354 | patch |
http://osvdb.org/80732 | vdb entry exploit |
http://osvdb.org/80733 | vdb entry exploit |
http://www.securityfocus.com/bid/52818 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/03/30/6 | mailing list |
http://forum.coppermine-gallery.net/index.php/topic%2C74682.0.html | |
http://www.openwall.com/lists/oss-security/2012/04/03/6 | exploit mailing list |
http://www.openwall.com/lists/oss-security/2012/03/30/5 | mailing list |