漏洞信息详情

Coppermine Photo Gallery 'include/imageObjectIM.class.php' 输入验证漏洞

漏洞简介

1.4.15版本之前的Coppermine Photo Gallery (CPG)中的include/imageObjectIM.class.php在ImageMagick图像处理程序设置后,远程攻击者可以通过picEditor.php中的(1) quality, (2)angle或 (3) clipval参数中的shell字符到达来执行任意命令。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

Coppermine Photo Gallery 1.4.10

Coppermine cpg1.4.15.zip

http://downloads.sourceforge.net/coppermine/cpg1.4.15.zip

Coppermine Photo Gallery 1.4.11

Coppermine cpg1.4.15.zip

http://downloads.sourceforge.net/coppermine/cpg1.4.15.zip

Coppermine Photo Gallery 1.4.12

Coppermine cpg1.4.15.zip

http://downloads.sourceforge.net/coppermine/cpg1.4.15.zip

Coppermine Photo Gallery 1.4.13

Coppermine cpg1.4.15.zip

http://downloads.sourceforge.net/coppermine/cpg1.4.15.zip

Coppermine Photo Gallery 1.4.14

Coppermine cpg1.4.15.zip

http://downloads.sourceforge.net/coppermine/cpg1.4.15.zip

参考网址

来源: BID

名称: 27512

链接:http://www.securityfocus.com/bid/27512

来源: coppermine-gallery.net

链接:http://coppermine-gallery.net/forum/index.php?topic=50103.0

来源: MISC

链接:http://www.waraxe.us/advisory-65.html

来源: VUPEN

名称: ADV-2008-0367

链接:http://www.vupen.com/english/advisories/2008/0367

来源: SECTRACK

名称: 1019286

链接:http://www.securitytracker.com/id?1019286

来源: BUGTRAQ

名称: 20080130 [waraxe-2008-SA#065] - Remote Shell Command Execution in Coppermine 1.4.14

链接:http://www.securityfocus.com/archive/1/archive/1/487310/100/200/threaded

来源: MILW0RM

名称: 5019

链接:http://www.milw0rm.com/exploits/5019

来源: SECUNIA

名称: 28682

链接:http://secunia.com/advisories/28682

补丁

    暂无

漏洞信息快速查询

相关漏洞

更多