exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

invisionGallery.txt

invisionGallery.txt
Posted Jun 21, 2005
Authored by James Bercegay | Site gulftech.org

Invision Gallery versions prior to 1.3.1 suffer from cross site scripting and SQL injection vulnerabilities. Exploitation details included.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | cab84da4a86eb75dd0850fa421865bc4a8a258f54008812d358752470a8235fa

invisionGallery.txt

Change Mirror Download
##########################################################
# GulfTech Security Research June 9th, 2005
##########################################################
# Vendor : Invision Power Services
# URL : http://www.invisiongallery.com
# Version : All Versions Prior To 1.3.1
# Risk : Multiple Vulnerabilities
##########################################################



Description:
Invision Gallery is a community based gallery software that can be
integrated into Invision Power Board. There are several security
issues in Invision Gallery that may allow for an attacker to force
a user into unknowingly / unwillingly perform actions on behalf of an
attacker, or an attacker may influence SQL queries and retrieve
sensitive information contained within the underlying database. An
upgrade has been released for several weeks now and all users should
upgrade their gallery installations as soon as possible.



Cross Site Request Forgery:
The proper precautions are not taken when dealing with certain actions,
and as a result an attacker can force a user to delete images, and albums
by having them simply follow a malicious link, or by including the link in
an embedded tag such as img or iframe.

http://localhost/index.php?act=module&module=gallery&cmd=albums&op=del&album=2
http://localhost/index.php?act=module&module=gallery&cmd=delimg&img=2

The above links could be used to effectively delete an album and an image.
This issue arises as a result of not properly adhering to RFC 2616 9.1.1



SQL Injection:
There are a couple of SQL Injection issues in Invision Gallery. The first
vulnerability I will talk about presents itself when editing comments.

http://localhost/index.php?act=module&module=gallery&cmd=editcomment&comment=
-99%20UNION%20SELECT%200,0,0,0,0,0,0,0,0,name,0,0,0%20FROM%20ibf_members%20
WHERE%201/*&img=1

The above example will select a users name from the database, but this could
just as easily be a password hash. The other SQL Injection issue is pretty
dangerous and presents itself when voting on a photo. Basically an attacker
may include arbitrary SQL statements instead of a rating, and influence an
UPDATE query which can be very dangerous.



Solution:
Updated version of the Invision Gallery software have been available for
many weeks now. Users should upgrade as soon as possible. Special thanks
to the guys at Invision for fixing these issues so quickly :)



Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00079-06092005



Credits:
James Bercegay of the GulfTech Security Research Team
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close