First published: Fri Apr 30 2004(Updated: )
picmgmtbatch.inc.php in Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers with administrative privileges to execute arbitrary commands via shell metacharacters in the (1) $CONFIG['impath'] or (2) $CONFIG['jpeg_qual'] parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Coppermine Photo Gallery | =1.1_beta_2 | |
Coppermine Photo Gallery | =1.2 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.0_final | |
Coppermine Photo Gallery | =1.0_rc3 | |
Coppermine Photo Gallery | =1.2.2_b | |
Coppermine Photo Gallery | =1.2.1 | |
Coppermine Photo Gallery | =1.1_.0 | |
PHP-Nuke | =6.9 | |
PHP-Nuke | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-1987 is classified as high due to the potential for remote command execution.
To fix CVE-2004-1987, it is recommended to upgrade to the latest version of Coppermine Photo Gallery or secure the affected parameters.
CVE-2004-1987 affects Coppermine Photo Gallery versions 1.2.2b, 1.2.1, 1.1_beta_2, and prior, as well as specific PHP-Nuke versions.
No, CVE-2004-1987 requires remote attackers to have administrative privileges to exploit the vulnerability.
CVE-2004-1987 can lead to arbitrary command execution, allowing attackers to execute commands on the server.