what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

phpImageEXIF.txt

phpImageEXIF.txt
Posted Aug 29, 2005
Authored by Cedric Cochin | Site cedri.cc

Various image galleries are susceptible to cross site scripting attacks via trusting EXIF data from images.

tags | advisory, xss
SHA-256 | 35a286655440f1221423c4dfc435a0247a3f9b0fa8ab3c9c4f1708f0449fa43f

phpImageEXIF.txt

Change Mirror Download
    Multiple PHP Images Galleries EXIF Metadata XSS Vulnerabilities

########################################################################
Summary :

A large majority of PHP Images Gallery Technologies now handle the
Exchangeable Image File (EXIF) header of jpeg files. The Exchangeable
Image File (EXIF) format is an international specification that lets
imaging companies encode metadata information into the headers or
application segments of a JPEG file. Unfortunately the metadata gathered
in the EXIF header are not well sanitized when displayed.

########################################################################
Details :

Displaying the EXIF information is a nice feature, and more and more
online gallery try to enable this functionnality to please their users.
The default behavior of all these technologies is not always the same,
in some cases you may have to configure the gallery to display the EXIF
info or install an additionnal tool (jhead for example) to enable the
functionnality.

When, the setup process is done, the EXIF info will be displayed
automatically when clicking on the picture (in rare cases you may have
to request the EXIF info by clicking on an information/exif button).

When displayed, the EXIF information is not sanitized, which makes the
gallery technology vulnerable to cross site scripting attacks.

Vulnerable Systems:

* Coppermine (up to 1.3.3, >= beta 1.4.1 not vulnerable)
==>http://coppermine.sourceforge.net/

* Gallery 1.5.1-RC2 and prior
(in addition the photo description field was vulnerable to XSS)
==>http://gallery.menalto.com/

* phpGraphy (up to version 0.9.9a, >= 0.9.10 not vulnerable)
==>http://phpgraphy.sourceforge.net/

* YaPig 0.95 and prior
==>http://yapig.sourceforge.net/

A large number of galleries are available, if you want to extend the
test panel, try for example :
http://directory.google.com/Top/Computers/Programming/Languages/PHP/Scripts/Image_Galleries/

Commercial technologies are vulnerable too

* PhotoPost PHP Pro (current version)
==> http://www.photopost.com/

After a short survey, it looks like online images galleries as MSN,
YAHOO, ShutterFly, Pixagogo, PictureTrail ... don't provide EXIF
metadata for now. So are not affected by this vulnerability.

Release Date :
August 26, 2005

Severity :
MEDIUM

########################################################################
Example :

Take your favorite picture, and save it in .jpg. Use the EXIF editor of
your choice and edit the Camera Model Tag. Replace the current value by
" <script>alert(document.cookie)</script> ".

Then upload the jpeg file to your favorite Online Gallery and click on
the picture ... XSS.

########################################################################
Vendor Status :

The information has been provided to all concerned Project Managers the
17th of August 2005.

* Coppermine
Update to Coppermine pg1.3.4
http://coppermine-gallery.net/forum/index.php?topic=20933.0

* Gallery
Update to the final release of Gallery 1.5.1.
http://gallery.menalto.com/modules.php?op=modload&name=phpWiki&file=index&pagename=Download
A patch for Gallery 1.5 and a new Debian's Gallery 1.2.5 package have
been released too.

* phpGraphy
Update to version 0.9.10
http://phpgraphy.sourceforge.net/download.php

* YaPig
No answer up to now.

* PhotoPost PHP Pro
On the 22nd of August:
"we'll be issuing an update to PhotoPost today which will sanitize this
data before being displayed"

########################################################################
Credit :

Cedric Cochin, Network Security Expert
Web Site: http://cedri.cc
< cedric.cochin [-at-] gmail .DoT. com >

Currently => SecureScout Product Integration Manager
Previously => netVigilance SecurityWatch Team Manager
Web Site => http://www.securescout.com || http://www.netvigilance.com

Original Advisory link:
http://cedri.cc/advisories/EXIF_XSS.txt
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close