Home page logo

fulldisclosure logo Full Disclosure mailing list archives

gallarific backdoored , vulnerable to xss
From: "Thomas Pollet" <thomas.pollet () gmail com>
Date: Tue, 15 Apr 2008 18:07:57 +0200


I was looking at the free version of gallarific, and I found some suspicious
code in the scopbin directory.
Attached is a file I found in the zip i downloaded, in case someone wants to
decode it.

the package can be downloaded from

Also, the software contains several xss flaws:

1) When modifying a user his email address like
h () h com"><script>alert(1);</script>
persistent xss wil occur when viewing gadmin/users.php or moderating the
comments in gadmin/comments.php

2) When adding a comment like "><script>alert(1)</script> , xss will occur
when moderating the comments

3) gallery/tags.php?tag="><script>alert(1)</script>

4) probably more bugs.

Thomas Pollet

Attachment: 911006.php

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]