Gallery before 1.5.9, and 2.x before 2.2.6, does not properly handle ZIP archives containing symbolic links, which allows remote authenticated users to conduct directory traversal attacks and read arbitrary files via vectors related to the archive upload (aka zip upload) functionality.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://gallery.menalto.com/gallery_1.5.9_released - Patch | |
References | () http://gallery.menalto.com/gallery_2.2.6_released - Patch | |
References | () http://secunia.com/advisories/31912 - | |
References | () http://secunia.com/advisories/32662 - | |
References | () http://secunia.com/advisories/33144 - | |
References | () http://security.gentoo.org/glsa/glsa-200811-02.xml - | |
References | () http://www.securityfocus.com/bid/31231 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45228 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00794.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00832.html - |
Information
Published : 2008-09-18 20:00
Updated : 2024-11-21 00:50
NVD link : CVE-2008-4129
Mitre link : CVE-2008-4129
CVE.ORG link : CVE-2008-4129
JSON object : View
Products Affected
gallery
- gallery
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')