First published: Sun Nov 26 2006(Updated: )
Coppermine Photo Gallery (CPG) 1.4.8 stable, with register_globals enabled, allows remote attackers to bypass XSS protection and set arbitrary variables via a query string that causes the variable to be defined in global space, with separate _GET, _REQUEST, or other critical parameters, which are unset by the protection scheme and prevent the original variable from being detected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Coppermine Photo Gallery | =1.4.8_stable | |
=1.4.8_stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-6123 is considered to be high due to its potential to allow remote code execution.
To fix CVE-2006-6123, disable register_globals in the PHP configuration and update to a patched version of Coppermine Photo Gallery.
CVE-2006-6123 exploits the register_globals configuration in PHP, leading to unauthorized variable access.
CVE-2006-6123 specifically affects Coppermine Photo Gallery version 1.4.8 stable.
Yes, CVE-2006-6123 can potentially allow attackers to bypass XSS protections due to improper handling of input parameters.