Vulnerabilities > CVE-2003-0614 - Unspecified vulnerability in Gallery Project Gallery

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
gallery-project
nessus
exploit available

Summary

Cross-site scripting (XSS) vulnerability in search.php of Gallery 1.1 through 1.3.4 allows remote attackers to insert arbitrary web script via the searchstring parameter.

Exploit-Db

descriptionGallery 1.2/1.3.x Search Engine Cross-Site Scripting Vulnerability. CVE-2003-0614. Webapps exploit for php platform
idEDB-ID:22961
last seen2016-02-02
modified2003-07-27
published2003-07-27
reporterLarry Nguyen
sourcehttps://www.exploit-db.com/download/22961/
titleGallery 1.2/1.3.x Search Engine Cross-Site Scripting Vulnerability

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-355.NASL
    descriptionLarry Nguyen discovered a cross site scripting vulnerability in gallery, a web-based photo album written in php. This security flaw can allow a malicious user to craft a URL that executes JavaScript code on your website.
    last seen2020-06-01
    modified2020-06-02
    plugin id15192
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15192
    titleDebian DSA-355-1 : gallery - XSS
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-355. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(15192);
      script_version("1.22");
      script_cvs_date("Date: 2019/08/02 13:32:17");
    
      script_cve_id("CVE-2003-0614");
      script_bugtraq_id(8288);
      script_xref(name:"DSA", value:"355");
    
      script_name(english:"Debian DSA-355-1 : gallery - XSS");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Larry Nguyen discovered a cross site scripting vulnerability in
    gallery, a web-based photo album written in php. This security flaw
    can allow a malicious user to craft a URL that executes JavaScript
    code on your website."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2003/dsa-355"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "For the current stable distribution (woody) this problem has been
    fixed in version 1.25-8woody1.
    
    We recommend that you update your gallery package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:gallery");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2003/07/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"3.0", prefix:"gallery", reference:"1.2.5-8woody1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyCGI abuses : XSS
    NASL idGALLERY_XSS.NASL
    descriptionThe version of Gallery hosted on the remote web server is affected by a cross-site scripting attack due to a failure to properly sanitize user-supplied input to the
    last seen2020-06-01
    modified2020-06-02
    plugin id11810
    published2003-07-28
    reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11810
    titleGallery search.php searchstring Parameter XSS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(11810);
      script_version("1.28");
      script_cvs_date("Date: 2018/07/11 17:09:24");
    
      script_cve_id("CVE-2003-0614");
      script_bugtraq_id(8288);
    
      script_name(english:"Gallery search.php searchstring Parameter XSS");
      script_summary(english:"Checks for the presence of search.php");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote web server contains a PHP script that is prone to a
    cross-site scripting attack."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "The version of Gallery hosted on the remote web server is affected by a
    cross-site scripting attack due to a failure to properly sanitize
    user-supplied input to the 'searchstring' parameter of the 'search.php'
    script.  A remote attacker may use this to steal the cookies from the
    legitimate users of this system."
      );
      script_set_attribute(attribute:"see_also", value:"http://galleryproject.org/node/82");
      script_set_attribute(attribute:"solution", value:"Upgrade to Gallery 1.3.4-pl1 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2003/07/27");
      script_set_attribute(attribute:"patch_publication_date", value:"2003/07/27");
      script_set_attribute(attribute:"plugin_publication_date", value:"2003/07/28");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:gallery_project:gallery");
      script_end_attributes();
    
      script_category(ACT_ATTACK);
      script_family(english:"CGI abuses : XSS");
    
      script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
    
      script_dependencies("gallery_detect.nasl", "cross_site_scripting.nasl");
      script_exclude_keys("Settings/disable_cgi_scanning");
      script_require_keys("www/gallery", "www/PHP");
      script_require_ports("Services/www", 80);
    
      exit(0);
    }
    
    #
    # The script code starts here
    #
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    include("webapp_func.inc");
    
    port = get_http_port(default:80, php:TRUE, no_xss:TRUE);
    
    install = get_install_from_kb(
      appname      : "gallery",
      port         : port,
      exit_on_fail : TRUE
    );
    
    dir = install["dir"];
    
    r = http_send_recv3(
      method : 'GET',
      item   : dir + "/search.php?searchstring=<script>"+SCRIPT_NAME+"</script>",
      port   : port,
      exit_on_fail : TRUE
    );
    
    if (
      r[0] =~ "^HTTP/1\.[01] +200 " &&
      "<script>"+SCRIPT_NAME+"</script>" >< r[2] &&
      "<!-- search.header begin -->" >< r[2]
    )
    {
      security_warning(port);
      set_kb_item(name:'www/'+port+'/XSS', value:TRUE);
    }
    else audit(AUDIT_WEB_APP_NOT_AFFECTED, "Gallery", build_url(qs:dir, port:port));