VID |
21969 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Gallery software is vulnerable to a local file include vulnerability via the 'stepOrder' parameter. Gallery is a Web-based photo album program written in PHP. Gallery version 2.0.3 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'stepOrder' parameter of the 'upgrade/index.php' script. If magic_quotes_gpc is set to 'off' and register_globals is set to 'on', a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://secunia.com/advisories/19175/ http://www.frsirt.com/english/advisories/2006/0895 http://milw0rm.com/exploits/1566
* Platforms Affected: Bharat Mediratta, Gallery version 2.0.3 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Gallery (2.0.4 or 2.1-RC-2a or later), available from the Gallery Project Page Web site at http://gallery.menalto.com/2.0.4_and_2.1_rc_2a_update
As a workaround, disable PHP's 'register_globals' setting or delete the application's 'upgrade/index.php' script. |
Related URL |
CVE-2006-1219 (CVE) |
Related URL |
17051 (SecurityFocus) |
Related URL |
25129 (ISS) |
|