Ralf Image Gallery (RIG) 0.7.4 and other versions before 1.0, when register_globals is enabled, allows remote attackers to conduct PHP remote file inclusion and directory traversal attacks via URLs or “…” sequences in the (1) dir_abs_src parameter in (a) check_entry.php, (b) admin_album.php, © admin_image.php, and (d) admin_util.php; and the (2) dir_abs_admin_src parameter in admin_album.php and admin_image.php. NOTE: this issue can be leveraged to conduct cross-site scripting (XSS) attacks.
rig.powerpulsar.com/#news
secunia.com/advisories/20771
securityreason.com/securityalert/1136
www.majorsecurity.de/advisory/major_rls18.txt
www.osvdb.org/26753
www.osvdb.org/26754
www.osvdb.org/26755
www.osvdb.org/26756
www.securityfocus.com/archive/1/437818/100/0/threaded
www.securityfocus.com/archive/1/438645/100/100/threaded
www.securityfocus.com/bid/18548
www.vupen.com/english/advisories/2006/2477
exchange.xforce.ibmcloud.com/vulnerabilities/27256
exchange.xforce.ibmcloud.com/vulnerabilities/27257
exchange.xforce.ibmcloud.com/vulnerabilities/27259