7.5
CVSSv2

CVE-2008-3486

Published: 06/08/2008 Updated: 29/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in the user_get_profile function in include/functions.inc.php in Coppermine Photo Gallery (CPG) 1.4.18 and previous versions, when the charset is utf-8, allows remote malicious users to include and execute arbitrary local files via a .. (dot dot) in the lang part of serialized data in an _data cookie.

Vulnerable Product Search on Vulmon Subscribe to Product

coppermine-gallery coppermine photo gallery 1.2.0

coppermine-gallery coppermine photo gallery 1.4.10

coppermine-gallery coppermine photo gallery 1.4.11

coppermine-gallery coppermine photo gallery 1.4.2

coppermine-gallery coppermine photo gallery 1.4.3

coppermine-gallery coppermine photo gallery 1.4.4

coppermine-gallery coppermine photo gallery

coppermine-gallery coppermine photo gallery 1.0

coppermine-gallery coppermine photo gallery 1.1

coppermine-gallery coppermine photo gallery 1.2.1

coppermine-gallery coppermine photo gallery 1.3.0

coppermine-gallery coppermine photo gallery 1.4.14

coppermine-gallery coppermine photo gallery 1.4.15

coppermine-gallery coppermine photo gallery 1.4.7

coppermine-gallery coppermine photo gallery 1.4.8

coppermine-gallery coppermine photo gallery 1.4.12

coppermine-gallery coppermine photo gallery 1.4.13

coppermine-gallery coppermine photo gallery 1.4.5

coppermine-gallery coppermine photo gallery 1.4.6

coppermine-gallery coppermine photo gallery 1.1.0

coppermine-gallery coppermine photo gallery 1.4.0

coppermine-gallery coppermine photo gallery 1.4.1

coppermine-gallery coppermine photo gallery 1.4.16

coppermine-gallery coppermine photo gallery 1.4.17

coppermine-gallery coppermine photo gallery 1.4.9

coppermine-gallery coppermine photo gallery 1.4

Exploits

<?php /* ---------------------------------------------------------------------- Coppermine Photo Gallery <= 1418 LFI / Remote Code Execution Exploit ---------------------------------------------------------------------- author: EgiX mail: n0b0d13s[at]gmail[dot]com link: coppermine-gallerynet/ dork: "Pow ...