First published: Sun May 02 2004(Updated: )
Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) phpinfo.php, (2) addpic.php, (3) config.php, (4) db_input.php, (5) displayecard.php, (6) ecard.php, (7) crop.inc.php, which reveal the full path in a PHP error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Coppermine Photo Gallery | =1.1_beta_2 | |
Coppermine Photo Gallery | =1.2 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.0_final | |
Coppermine Photo Gallery | =1.0_rc3 | |
Coppermine Photo Gallery | =1.2.2_b | |
Coppermine Photo Gallery | =1.2.1 | |
Coppermine Photo Gallery | =1.1_.0 | |
PHP-Nuke | =6.9 | |
PHP-Nuke | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1984 has been classified as a high severity vulnerability due to potential exposure of sensitive information.
To fix CVE-2004-1984, upgrade to a secure version of Coppermine Photo Gallery that addresses this vulnerability.
CVE-2004-1984 affects Coppermine Photo Gallery versions 1.2.2b, 1.2.1, 1.1 beta, and earlier versions, as well as specific versions of PHP-Nuke.
Yes, CVE-2004-1984 can potentially lead to further exploitation by revealing server paths to attackers.
CVE-2004-1984 can be exploited through direct HTTP requests to files like phpinfo.php, config.php, and db_input.php.