Vulnerabilities > CVE-2005-3251 - Unspecified vulnerability in Gallery Project Gallery
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN gallery-project
nessus
Summary
Directory traversal vulnerability in the gallery script in Gallery 2.0 (G2) allows remote attackers to read or include arbitrary files via ".." sequences in the g2_itemId parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Nessus
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_47BDABCF3CF911DABAA20004614CC33D.NASL description Michael Dipper wrote : A vulnerability has been discovered in gallery, which allows remote users unauthorized access to files on the webserver. A remote user accessing gallery over the web may use specially crafted HTTP parameters to access arbitrary files located on the webserver. All files readable by the webserver process are subject to disclosure. The vulnerability is *not* restricted to the webserver last seen 2020-06-01 modified 2020-06-02 plugin id 21424 published 2006-05-13 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21424 title FreeBSD : gallery2 -- file disclosure vulnerability (47bdabcf-3cf9-11da-baa2-0004614cc33d) NASL family CGI abuses NASL id GALLERY_G2_ITEMID_DIR_TRAVERSAL.NASL description The version of Gallery hosted on the remote web server fails to sanitize user-supplied input to the last seen 2020-06-01 modified 2020-06-02 plugin id 20015 published 2005-10-18 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20015 title Gallery main.php g2_itemId Parameter Traversal Arbitrary File Access
References
- http://dipper.info/security/20051012/
- http://dipper.info/security/20051012/
- http://gallery.menalto.com/gallery_2.0.1_released
- http://gallery.menalto.com/gallery_2.0.1_released
- http://secunia.com/advisories/17205
- http://secunia.com/advisories/17205
- http://securityreason.com/securityalert/88
- http://securityreason.com/securityalert/88
- http://www.vuxml.org/freebsd/47bdabcf-3cf9-11da-baa2-0004614cc33d.html
- http://www.vuxml.org/freebsd/47bdabcf-3cf9-11da-baa2-0004614cc33d.html