Joined: 25 Feb 2003
Location: Essen, Germany
|Posted: Mon Jan 31, 2005 9:00 am Post subject: [ GLSA 200501-45 ] Gallery: Cross-site scripting vulnerabili
|Gentoo Linux Security Advisory
Title: Gallery: Cross-site scripting vulnerability (GLSA 200501-45)
Date: January 30, 2005
Updated: May 22, 2006
Gallery is vulnerable to cross-site scripting attacks.
Gallery is a web application written in PHP which is used to organize and publish photo albums. It allows multiple users to build and maintain their own albums. It also supports the mirroring of images on other servers.
Vulnerable: < 1.4.4_p6
Unaffected: >= 1.4.4_p6
Architectures: All supported architectures
Rafel Ivgi has discovered a cross-site scripting vulnerability where the 'username' parameter is not properly sanitized in 'login.php'.
By sending a carefully crafted URL, an attacker can inject and execute script code in the victim's browser window, and potentially compromise the user's gallery.
There is no known workaround at this time.
All Gallery users should upgrade to the latest version:
Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.
|# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/gallery-1.4.4_p6"
Secunia Advisory SA13887
Last edited by GLSA on Sat Oct 13, 2007 4:17 am; edited 4 times in total