DSA-642-1 gallery -- several vulnerabilities

Related Vulnerabilities: CVE-2004-1106  

Several vulnerabilities have been discovered in gallery, a web-based photo album written in PHP4. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CAN-2004-1106 Jim Paris discovered a cross site scripting vulnerability which allows code to be inserted by using specially formed URLs. CVE-NOMATCH The upstream developers of gallery have fixed several cases of possible variable injection that could trick gallery to unintended actions, e.g. leaking database passwords. For the stable distribution (woody) these problems have been fixed in version 1.2.5-8woody3. For the unstable distribution (sid) these problems have been fixed in version 1.4.4-pl4-1. We recommend that you upgrade your gallery package.

Debian Security Advisory

DSA-642-1 gallery -- several vulnerabilities

Date Reported:
17 Jan 2005
Affected Packages:
gallery
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 11602.
In Mitre's CVE dictionary: CVE-2004-1106.
More information:

Several vulnerabilities have been discovered in gallery, a web-based photo album written in PHP4. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:

  • CAN-2004-1106

    Jim Paris discovered a cross site scripting vulnerability which allows code to be inserted by using specially formed URLs.

  • CVE-NOMATCH

    The upstream developers of gallery have fixed several cases of possible variable injection that could trick gallery to unintended actions, e.g. leaking database passwords.

For the stable distribution (woody) these problems have been fixed in version 1.2.5-8woody3.

For the unstable distribution (sid) these problems have been fixed in version 1.4.4-pl4-1.

We recommend that you upgrade your gallery package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5-8woody3.dsc
http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5-8woody3.diff.gz
http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5-8woody3_all.deb

MD5 checksums of the listed files are available in the original advisory.