SQL injection vulnerability in upload.php in Coppermine Photo Gallery (CPG) 1.4.16 and earlier allows remote authenticated users or user-assisted remote HTTP servers to execute arbitrary SQL commands via the Content-Type HTTP response header provided by the HTTP server that is used for an upload.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://forum.coppermine-gallery.net/index.php/topic%2C51787%2C0.html - | |
| References | () http://secunia.com/advisories/29795 - Vendor Advisory | |
| References | () http://sourceforge.net/project/shownotes.php?group_id=89658&release_id=592069 - Patch | |
| References | () http://www.osvdb.org/44345 - | |
| References | () http://www.securityfocus.com/bid/28766 - Patch | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41784 - | 
Information
                Published : 2008-04-16 17:05
Updated : 2025-04-09 00:30
NVD link : CVE-2008-1840
Mitre link : CVE-2008-1840
CVE.ORG link : CVE-2008-1840
JSON object : View
Products Affected
                coppermine
- coppermine_photo_gallery
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
