Zenphoto Multiple Security Vulnerabilities


Zenphoto is prone to multiple security vulnerabilities, including: 1. Multiple SQL-injection vulnerabilities. 2. An information-disclosure vulnerability. 3. Multiple cross-site scripting vulnerabilities. 4. Multiple security-bypass vulnerabilities. 5. An IP Address Spoofing Vulnerability.


The information has been provided by Janek Vind ‘waraxe’.


Vulnerable Systems:
 * Zenphoto

Attackers can exploit these issues to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database, obtain sensitive information, bypass certain security restrictions, and spoof an IP address which may lead to a false sense of trust and allow the attacker to perform malicious activities; other attacks may also be possible.

Attackers can the exploit path-disclosure, information-disclosure and SQL-injection issues through a browser. Attackers can exploit the IP address spoofing issue with readily available tools. To exploit a cross-site scripting issue, the attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URIs and input data are available:

Disclosure Timeline:
Published: November 05 2012

Categories: News