Lucene search

K
gentooGentoo FoundationGLSA-200501-45
HistoryJan 30, 2005 - 12:00 a.m.

Gallery: Cross-site scripting vulnerability

2005-01-3000:00:00
Gentoo Foundation
security.gentoo.org
19

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.013

Percentile

86.1%

Background

Gallery is a web application written in PHP which is used to organize and publish photo albums. It allows multiple users to build and maintain their own albums. It also supports the mirroring of images on other servers.

Description

Rafel Ivgi has discovered a cross-site scripting vulnerability where the ‘username’ parameter is not properly sanitized in ‘login.php’.

Impact

By sending a carefully crafted URL, an attacker can inject and execute script code in the victim’s browser window, and potentially compromise the user’s gallery.

Workaround

There is no known workaround at this time.

Resolution

All Gallery users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.4.4_p6"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/gallery< 1.4.4_p6UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.013

Percentile

86.1%