First published: Sat Dec 31 2005(Updated: )
Direct static code injection vulnerability in Yet Another PHP Image Gallery (YaPIG) 0.95b and earlier allows remote authenticated administrators to inject arbitrary PHP code via the TestGallery parameter in a mod_info action to modify_gallery.php, which inserts the code into guid_info.php. NOTE: this issue is easier to exploit due to a separate CSRF vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yapig | =0.94u | |
Yapig | =0.93u | |
Yapig | =0.92b | |
Yapig | =0.95 | |
Yapig | <=0.95b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4800 is categorized as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2005-4800, update to YaPIG version 0.96 or later, which addresses this vulnerability.
CVE-2005-4800 affects versions of YaPIG up to and including 0.95b.
CVE-2005-4800 is a direct static code injection vulnerability.
Attackers can exploit CVE-2005-4800 to inject arbitrary PHP code into the application, potentially leading to full compromise.