VID |
21966 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Gallery software is vulnerable to multiple vulnerabilities via the 'X_FORWARDED_FOR' HTTP header. Gallery is a Web-based photo album program written in PHP. Gallery versions 2.0 through 2.0.2 are vulnerable to multiple vulnerabilities as follows:
1) IP Spoofing : Input passed to the 'X_FORWARDED_FOR' header isn't properly sanitized. This can be exploited to spoof the IP address that is logged when adding comments in an album. 2) Cross-Site Scripting : Input passed to the 'getRemoteHostAddress()' function isn't properly sanitized. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected website when a malicious comment is viewed. 3) Security Bypass : Input passed in the session id isn't properly sanitized before being used. This can be exploited to delete arbitrary files that are used by the web server processes.
* References: http://www.gulftech.org/?node=research&article_id=00106-03022006 http://www.securityfocus.com/archive/1/426655/30/0/threaded http://secunia.com/advisories/19104/ http://www.frsirt.com/english/advisories/2006/0813 http://securitytracker.com/id?1015717 http://archives.neohapsis.com/archives/bugtraq/2006-02/0621.html
* Platforms Affected: Bharat Mediratta, Gallery versions 2.0 through 2.0.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Gallery (2.0.3 or later), available from the Gallery Project Page Web site at http://gallery.menalto.com/gallery_2.0.3_released |
Related URL |
CVE-2006-1126,CVE-2006-1127,CVE-2006-1128 (CVE) |
Related URL |
16940,16948 (SecurityFocus) |
Related URL |
25117,25118,25120 (ISS) |
|