Korean
<< Back
VID 21966
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Gallery software is vulnerable to multiple vulnerabilities via the 'X_FORWARDED_FOR' HTTP header. Gallery is a Web-based photo album program written in PHP. Gallery versions 2.0 through 2.0.2 are vulnerable to multiple vulnerabilities as follows:

1) IP Spoofing : Input passed to the 'X_FORWARDED_FOR' header isn't properly sanitized. This can be exploited to spoof the IP address that is logged when adding comments in an album.
2) Cross-Site Scripting : Input passed to the 'getRemoteHostAddress()' function isn't properly sanitized. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected website when a malicious comment is viewed.
3) Security Bypass : Input passed in the session id isn't properly sanitized before being used. This can be exploited to delete arbitrary files that are used by the web server processes.

* References:
http://www.gulftech.org/?node=research&article_id=00106-03022006
http://www.securityfocus.com/archive/1/426655/30/0/threaded
http://secunia.com/advisories/19104/
http://www.frsirt.com/english/advisories/2006/0813
http://securitytracker.com/id?1015717
http://archives.neohapsis.com/archives/bugtraq/2006-02/0621.html

* Platforms Affected:
Bharat Mediratta, Gallery versions 2.0 through 2.0.2
Any operating system Any version
Recommendation Upgrade to the latest version of Gallery (2.0.3 or later), available from the Gallery Project Page Web site at http://gallery.menalto.com/gallery_2.0.3_released
Related URL CVE-2006-1126,CVE-2006-1127,CVE-2006-1128 (CVE)
Related URL 16940,16948 (SecurityFocus)
Related URL 25117,25118,25120 (ISS)