GPhotos versions 1.5 and below suffer from directory traversal and cross site scripting flaws.
8e74a3bed766b60506f332590b45275a84e907067d59eb2a1a674d844971a4c2
Details
The first vulnerability issue is due to an input validation error in "index.php" "diapo.php" and "affich.php" scripts that do not validate "rep","image" variables, which may be exploited to cross site scripting attacks.
https://traget/index.php?rep=[xss]
https://traget/diapo.php?rep=[xss]
https://traget/affich.php?image=[xss]
The second flaw is due to an input validation error in the "index.php" script that fails to properly validate "rep" variable, which may be exploited to disclose the contents of arbitrary folders.
https://traget/index.php?rep=../../../
Vulnerable versions
GPhotos 1.5 and prior
Credits
Moroccan Security
Contact
[ Psych0 ] <doz(at)bsdmail(dot)com>