var-200404-0075
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in menu.inc.php in Coppermine Photo Gallery 1.2.2b allows remote attackers to inject arbitrary HTML or web script via the CPG_URL parameter. Coppermine Photo Gallery is a WEB-based graphics library management program. Coppermine Photo Gallery does not fully filter the input submitted by users in many places. Remote attackers can use these vulnerabilities to execute arbitrary commands, obtain COOKIE data, and obtain sensitive file paths and other information. The specific issues are as follows: 1. Path leakage: By directly accessing some configuration scripts, sensitive path information can be obtained. 2. Cross-site scripting attack coppermine/docs/menu.inc.php\'\' lacks filtering for user submitted URIs, attackers can use this vulnerability to obtain sensitive information. 3. Browse any directory: If you have PHP-Nuke administrator privileges, you can bypass directory restrictions to access other files by accessing the coppermine module. 4. Arbitrary command execution: If you have PHP-Nuke administrator privileges to access the coppermine module, you can enter the SHELL command in some parameters of the coppermine configuration panel, and execute it with WEB process privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200404-0075", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "photo gallery", "scope": "eq", "trust": 1.6, "vendor": "coppermine", "version": "1.2.1" }, { "model": "photo gallery", "scope": "eq", "trust": 1.6, "vendor": "coppermine", "version": "1.1_beta_2" }, { "model": "photo gallery", "scope": "eq", "trust": 1.6, "vendor": "coppermine", "version": "1.0_rc3" }, { "model": "photo gallery", "scope": "eq", "trust": 1.6, "vendor": "coppermine", "version": "1.1_.0" }, { "model": "photo gallery", "scope": "eq", "trust": 1.6, "vendor": "coppermine", "version": "1.2" }, { "model": "photo gallery", "scope": "eq", "trust": 1.6, "vendor": "coppermine", "version": "1.2.2_b" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.1" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "6.9" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.0_final" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.0" }, { "model": "php-nuke", "scope": "eq", "trust": 1.0, "vendor": "francisco burzi", "version": "7.2" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200404-101" }, { "db": "NVD", "id": "CVE-2004-1985" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Janek Vind\u203b come2waraxe@yahoo.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200404-101" } ], "trust": 0.6 }, "cve": "CVE-2004-1985", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2004-1985", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-10413", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-1985", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200404-101", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-10413", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-10413" }, { "db": "CNNVD", "id": "CNNVD-200404-101" }, { "db": "NVD", "id": "CVE-2004-1985" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in menu.inc.php in Coppermine Photo Gallery 1.2.2b allows remote attackers to inject arbitrary HTML or web script via the CPG_URL parameter. Coppermine Photo Gallery is a WEB-based graphics library management program. Coppermine Photo Gallery does not fully filter the input submitted by users in many places. Remote attackers can use these vulnerabilities to execute arbitrary commands, obtain COOKIE data, and obtain sensitive file paths and other information. The specific issues are as follows: 1. Path leakage: By directly accessing some configuration scripts, sensitive path information can be obtained. 2. Cross-site scripting attack coppermine/docs/menu.inc.php\\\u0027\\\u0027 lacks filtering for user submitted URIs, attackers can use this vulnerability to obtain sensitive information. 3. Browse any directory: If you have PHP-Nuke administrator privileges, you can bypass directory restrictions to access other files by accessing the coppermine module. 4. Arbitrary command execution: If you have PHP-Nuke administrator privileges to access the coppermine module, you can enter the SHELL command in some parameters of the coppermine configuration panel, and execute it with WEB process privileges", "sources": [ { "db": "NVD", "id": "CVE-2004-1985" }, { "db": "VULHUB", "id": "VHN-10413" } ], "trust": 0.99 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-10413", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10413" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "OSVDB", "id": "5757", "trust": 1.7 }, { "db": "NVD", "id": "CVE-2004-1985", "trust": 1.7 }, { "db": "SECUNIA", "id": "11524", "trust": 1.7 }, { "db": "BID", "id": "10253", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200404-101", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20040502 [WARAXE-2004-SA#026 - MULTIPLE VULNERABILITIES IN COPPERMINE PHOTO GALLERY FOR PHPNUKE]", "trust": 0.6 }, { "db": "XF", "id": "16040", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "24072", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-77810", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-10413", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-10413" }, { "db": "CNNVD", "id": "CNNVD-200404-101" }, { "db": "NVD", "id": "CVE-2004-1985" } ] }, "id": "VAR-200404-0075", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-10413" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:50:07.757000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1985" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/10253" }, { "trust": 1.7, "url": "http://www.osvdb.org/5757" }, { "trust": 1.7, "url": "http://secunia.com/advisories/11524" }, { "trust": 1.6, "url": "http://www.waraxe.us/index.php?modname=sa\u0026id=26" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16040" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108360247732014\u0026w=2" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16040" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108360247732014\u0026w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108360247732014\u0026amp;w=2" }, { "trust": 0.1, "url": "http://www.waraxe.us/index.php?modname=sa\u0026amp;id=26" } ], "sources": [ { "db": "VULHUB", "id": "VHN-10413" }, { "db": "CNNVD", "id": "CNNVD-200404-101" }, { "db": "NVD", "id": "CVE-2004-1985" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-10413" }, { "db": "CNNVD", "id": "CNNVD-200404-101" }, { "db": "NVD", "id": "CVE-2004-1985" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-04-30T00:00:00", "db": "VULHUB", "id": "VHN-10413" }, { "date": "2004-04-30T00:00:00", "db": "CNNVD", "id": "CNNVD-200404-101" }, { "date": "2004-04-30T04:00:00", "db": "NVD", "id": "CVE-2004-1985" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-10413" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200404-101" }, { "date": "2024-11-20T23:52:13.540000", "db": "NVD", "id": "CVE-2004-1985" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200404-101" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Coppermine Photo Gallery Multiple input validation vulnerabilities", "sources": [ { "db": "CNNVD", "id": "CNNVD-200404-101" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200404-101" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.