Vulnerabilities > CVE-2004-2124 - Unspecified vulnerability in Gallery Project Gallery
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The register_globals simulation capability in Gallery 1.3.1 through 1.4.1 allows remote attackers to modify the HTTP_POST_VARS variable and conduct a PHP remote file inclusion attack via the GALLERY_BASEDIR parameter, a different vulnerability than CVE-2002-1412.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Exploit-Db
description | Gallery 1.3.x/1.4 Remote Global Variable Injection Vulnerability. CVE-2004-2124 . Webapps exploit for php platform |
id | EDB-ID:23599 |
last seen | 2016-02-02 |
modified | 2004-01-26 |
published | 2004-01-26 |
reporter | Bharat Mediratta |
source | https://www.exploit-db.com/download/23599/ |
title | Gallery 1.3.x/1.4 - Remote Global Variable Injection Vulnerability |
Nessus
NASL family CGI abuses NASL id GALLERY_INJECTION3.NASL description It is possible to make the remote host include PHP files hosted on a third-party server using the version of Gallery installed on the remote host. An attacker may use this flaw to inject arbitrary code in the remote host and gain a shell with the privileges of the web server. last seen 2020-06-01 modified 2020-06-02 plugin id 12030 published 2004-01-29 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/12030 title Gallery HTTP Global Variables File Inclusion NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_12B1A62D60564D909E2145FCDE6ABAE4.NASL description A web server running Gallery can be exploited for arbitrary PHP code execution through the use of a maliciously crafted URL. last seen 2020-06-01 modified 2020-06-02 plugin id 18846 published 2005-07-13 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/18846 title FreeBSD : gallery -- remote code injection via HTTP_POST_VARS (12b1a62d-6056-4d90-9e21-45fcde6abae4)
References
- http://gallery.menalto.com/modules.php?op=modload&name=News&file=index
- http://gallery.menalto.com/modules.php?op=modload&name=News&file=index
- http://marc.info/?l=bugtraq&m=107524414317693&w=2
- http://marc.info/?l=bugtraq&m=107524414317693&w=2
- http://secunia.com/advisories/10712/
- http://secunia.com/advisories/10712/
- http://www.gentoo.org/security/en/glsa/glsa-200402-04.xml
- http://www.gentoo.org/security/en/glsa/glsa-200402-04.xml
- http://www.osvdb.org/3737
- http://www.osvdb.org/3737
- http://www.securityfocus.com/bid/9490
- http://www.securityfocus.com/bid/9490
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14950
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14950