Vulnerabilities > CVE-2005-2596 - Unspecified vulnerability in Gallery Project Gallery 1.3.4

047910
CVSS 4.6 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
low complexity
gallery-project
nessus

Summary

User.php in Gallery, as used in Postnuke, allows users with any Admin privileges to gain access to all galleries.

Vulnerable Configurations

Part Description Count
Application
Gallery_Project
1

Nessus

  • NASL familyCGI abuses
    NASL idGALLERY_POSTNUKE_ACCESS_VALIDATION.NASL
    descriptionThe remote host is running Gallery, a web-based photo album. According to its banner, the version of Gallery installed on the remote host is subject to an access validation issue when integrated with PostNuke, as is the case on the remote host. The issue means that any user with any level of admin privileges in PostNuke also has admin privileges in Gallery.
    last seen2020-06-01
    modified2020-06-02
    plugin id19419
    published2005-08-12
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/19419
    titleGallery PostNuke Integration Access Validation Privilege Escalation
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description) {
      script_id(19419);
      script_version("1.15");
    
      script_cve_id("CVE-2005-2596");
      script_bugtraq_id(14547);
    
      script_name(english:"Gallery PostNuke Integration Access Validation Privilege Escalation");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote web server contains a PHP application that does not
    properly validate access." );
     script_set_attribute(attribute:"description", value:
    "The remote host is running Gallery, a web-based photo album. 
    
    According to its banner, the version of Gallery installed on the
    remote host is subject to an access validation issue when integrated
    with PostNuke, as is the case on the remote host.  The issue means
    that any user with any level of admin privileges in PostNuke also has
    admin privileges in Gallery." );
     script_set_attribute(attribute:"see_also", value:"http://gallery.menalto.com/index.php?name=PNphpBB2&file=viewtopic&t=7048" );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?741ad7ee" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to Gallery 1.5.1-RC2 or later." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:F/RL:ND/RC:ND");
     script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "2005/08/12");
     script_set_attribute(attribute:"vuln_publication_date", value: "2005/08/10");
     script_cvs_date("Date: 2018/06/14 12:21:47");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_end_attributes();
    
      script_summary(english:"Checks for PostNuke integration access validation vulnerability in Gallery");
      script_category(ACT_ATTACK);
      script_family(english:"CGI abuses");
      script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
      script_dependencies("postnuke_detect.nasl");
      script_exclude_keys("Settings/disable_cgi_scanning");
      script_require_ports("Services/www", 80);
      script_require_keys("www/PHP");
      exit(0);
    }
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    
    port = get_http_port(default:80);
    if (!can_host_php(port:port)) exit(0);
    
    
    # Test an install.
    install = get_kb_item(string("www/", port, "/postnuke"));
    if (isnull(install)) exit(0);
    matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
    if (!isnull(matches)) {
      dir = matches[2];
    
      # Call up Gallery's main index.
      w = http_send_recv3(method:"GET",
        item:string(
          dir, "/modules.php?",
          "op=modload&",
          "name=gallery&",
          "file=index"
        ), 
        port:port
      );
      if (isnull(w)) exit(1, "the web server did not answer");
      res = w[2];
    
      # There's a problem if the reported version is < 1.5.1-RC2.
      if (egrep(string:res, pattern:"Powered by <a href=.+>Gallery.* v(0\.|1\.([0-4]\.|5\.(0|1-RC1)))")) {
        security_warning(port);
        exit(0);
      }
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-879.NASL
    descriptionA bug in gallery has been discovered that grants all registrated postnuke users full access to the gallery.
    last seen2020-06-01
    modified2020-06-02
    plugin id22745
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22745
    titleDebian DSA-879-1 : gallery - programming error