Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 27 Oct 2015 13:35:40 +0530
From: Dis close <>
Subject: CVE Request: Multiple XSS in NextGEN Gallery by Photocrati Version 2.1.7


# Title : Multiple XSS in NextGEN Gallery by Photocrati Version 2.1.7
# Affected Product  : NextGEN Gallery by Photocrati Version 2.1.7
# Vendor Homepage :
# Vulnerability Type  : Cross Site Scripting (XSS)
# Risk : High
# POC URL              :
# Status : Fixed

By exploiting a Cross-site scripting vulnerability the attacker can hijack
a logged in user’s session by stealing cookies. This means that the
malicious hacker can change the logged in user’s password and invalidate
the session of the victim while the hacker maintains access.

Technical Details

   1. Logon into any wordpress application (localhost or public host)
   2. Modifying the above mentioned variables in NextGEN Gallery Photocrati
   Version 2.1.7
   3. Fill all the variables with* “><img src=x onerror=prompt(1)>* payload
   and save it to view further.
   4. Now, the added XSS payload will be executed whenever we review it.

Advisory Timeline

31-08-2015 – Discovered in NextGen Gallery 2.1.7 version
31-08-2015 – Reported to WP Plugin (
31-08-2015 – Advance CVE Requested
01-09-2015 – Vendor Responded.
01-09-2015 – Fixed in 2.1.10 version of NextGen Gallery


Credits & Authors
================ from cybersecurityworks Pvt Ltd

About Cybersecurityworks
Cybersecurity Works is basically an auditing company passionate working on
findings & reporting security flaws & vulnerabilities on web application
and network. As professionals, we handle each client differently based on
their unique requirements. Visit our website for more information.

Please assign CVE as appropriate. Thanks for your valuable time & effort


Cheers !!!

Team CSW

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ