Description
Multiple PHP remote file inclusion vulnerabilities in PhotoKorn Gallery 1.52 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the dir_path parameter in (1) includes/cart.inc.php or (2) extras/ext_cats.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Saudi Hackrz · textwebappsphp
https://www.exploit-db.com/exploits/2327
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/28811
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3520
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2006-09/0119.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21796
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28601
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/19914
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28602
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/445582/100/0/threaded
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/2327
Scores
EPSS
0.1291
EPSS Percentile
94.1%
Details
Status
published
Products (1)
gtasoft/photokorn_gallery
< 1.52
Published
Sep 09, 2006
Tracked Since
Feb 18, 2026