[29915] in bugtraq

home help back first fref pref prev next nref lref last post

Album.pl Vulnerability - Remote Command Execution

daemon@ATHENA.MIT.EDU (aresu@bosen.net)
Sat Apr 26 15:17:59 2003

Message-ID: <1051383029.3eaad4f50b4d8@webmail.bosen.net>
Date: Sun, 27 Apr 2003 01:50:29 +0700
From: aresu@bosen.net
To: bugtraq@securityfocus.com
MIME-Version: 1.0
Content-Type: text/plain; charset=windows-1252;q=1.0
Content-Transfer-Encoding: 8bit
X-Errot-Report-To: Agus Supriadhie <bosen@antionline.org>

AresU Advisory
04/27/2003

Album.pl Vulnerability

Severity : High (CGI Remote Command Execution)
Systems Affected: Album.pl up to v6.1
Vendor URL: http://perl.bobbitt.ca/album
Vuln Type : CGI Remote Command Execution
Status    : Vendor contacted, new fixed version available
Author    : AresU
Greetz to : Mike B., Bosen, Tioeuy, syzwz, Heltz, eF73, SakitJiwa, nimdA, Br0374l, FreshFirst, Algorithm
All 1ndonesian Security Team (1st)
http://www.bosen.net/releases/
http://bosen.blogspot.com

Summary
=======
album.pl is a popular web photo album application that allows you to simply drop new photo files into a directory, and they will automatically be accessible via the web.
Any user can execute commands with Web Server privileges (normally nobody) when use an alternate configuration file.

Solution
========
Upgrade to a newer album.pl version (at least 6.2)
http://perl.bobbitt.ca/album/album62.zip
  
Acknowledgments
===============
Vulnerability discovery and advisory by AresU

Vendor Response
===============
Vendor has been contacted and new fixed version is available.

Exploit Code
============
I have refrained from publishing a more functional exploit at this time, 
to delay attacks against album.pl installations.

-----------------------------------------------
This mail sent through http://webmail.bosen.net

home help back first fref pref prev next nref lref last post