SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Gallery Vendors:   Gallery Project
(Gentoo Issues Fix) Gallery 'init.php' Authentication Flaw Grants Administrative Access
SecurityTracker Alert ID:  1010519
SecurityTracker URL:  http://securitytracker.com/id/1010519
CVE Reference:   CVE-2004-0522   (Links to External Site)
Date:  Jun 17 2004
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.2 - 1.4.3-pl1
Description:   A vulnerability was reported in Gallery. A remote user can access the application with administrator privileges.

The vendor reported that a remote user can login to an arbitrary user account (including an administrator's account) without any password by emulating that Gallery is embedded. As a result, a remote user can login to the Gallery application as an administrator and perform any actions on the target Gallery albums.

Impact:   A remote user can gain administrative access to the application.
Solution:   Gentoo has released a fix and indicates that all users should upgrade to the latest available version of Gallery.

# emerge sync

# emerge -pv ">=app-misc/gallery-1.4.3_p2"
# emerge ">=app-misc/gallery-1.4.3_p2"

Vendor URL:  gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=123&mode=thread&order=0&thold=0 (Links to External Site)
Cause:   Authentication error
Underlying OS:  Linux (Gentoo)

Message History:   This archive entry is a follow-up to the message listed below.
Jun 2 2004 Gallery 'init.php' Authentication Flaw Grants Administrative Access



 Source Message Contents

Subject:  [gentoo-announce] [ GLSA 200406-10 ] Gallery: Privilege escalation vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200406-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: Gallery: Privilege escalation vulnerability
      Date: June 15, 2004
      Bugs: #52798
        ID: 200406-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

There is a vulnerability in the Gallery photo album software which may
allow an attacker to gain administrator privileges within Gallery.

Background
==========

Gallery is a web application written in PHP which is used to organize
and publish photo albums. It allows multiple users to build and
maintain their own albums. It also supports the mirroring of images on
other servers.

Affected packages
=================

    -------------------------------------------------------------------
     Package           /   Vulnerable   /                   Unaffected
    -------------------------------------------------------------------
  1  app-misc/gallery      <= 1.4.3_p1                     >= 1.4.3_p2

Description
===========

There is a vulnerability in the Gallery photo album software which may
allow an attacker to gain administrator privileges within Gallery. A
Gallery administrator has full access to all albums and photos on the
server, thus attackers may add or delete photos at will.

Impact
======

Attackers may gain full access to all Gallery albums. There is no risk
to the webserver itself, or the server on which it runs.

Workaround
==========

There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version.

Resolution
==========

All users should upgrade to the latest available version of Gallery.

    # emerge sync

    # emerge -pv ">=app-misc/gallery-1.4.3_p2"
    # emerge ">=app-misc/gallery-1.4.3_p2"

References
==========

  [ 1 ] Gallery Announcement

http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=123&mode=thread&order=0&thold=0

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

     http://security.gentoo.org/glsa/glsa-200406-10.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2004 Gentoo Technologies, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/1.0

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFAz0qMvcL1obalX08RAmuoAKCKcyWXNtt+mdgtX26R9l96V8yE4QCfVFQG
9s9GiyiY83X/VHcx2Kc+mQQ=
=+z9+
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC