YaPiG <= 0.9.5b Multiple Vulnerabilities

medium Nessus Plugin ID 19515

Synopsis

The remote web server contains a PHP application that is prone to code injection and cross-site scripting attacks.

Description

The remote host is running YaPiG, a web-based image gallery written in PHP.

According to its banner, the version of YaPiG installed on the remote host is prone to arbitrary PHP code injection and cross-site scripting attacks.

Solution

Remove the software as it is no longer maintained.

See Also

http://cedri.cc/advisories/EXIF_XSS.txt

http://www.seclab.tuwien.ac.at/advisories/TUVSA-0510-001.txt

https://seclists.org/bugtraq/2006/Aug/482

Plugin Details

Severity: Medium

ID: 19515

File Name: yapig_exif_xss.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 8/27/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 8/25/2005

Reference Information

CVE: CVE-2005-2736, CVE-2005-4799, CVE-2006-4421

BID: 14670, 15092, 15095, 19709, 23814, 47698

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990