Vulnerabilities > CVE-2005-3251 - Directory Traversal vulnerability in Gallery
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
NONE Summary
Directory traversal vulnerability in the gallery script in Gallery 2.0 (G2) allows remote attackers to read or include arbitrary files via ".." sequences in the g2_itemId parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Nessus
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_47BDABCF3CF911DABAA20004614CC33D.NASL description Michael Dipper wrote : A vulnerability has been discovered in gallery, which allows remote users unauthorized access to files on the webserver. A remote user accessing gallery over the web may use specially crafted HTTP parameters to access arbitrary files located on the webserver. All files readable by the webserver process are subject to disclosure. The vulnerability is *not* restricted to the webserver last seen 2020-06-01 modified 2020-06-02 plugin id 21424 published 2006-05-13 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21424 title FreeBSD : gallery2 -- file disclosure vulnerability (47bdabcf-3cf9-11da-baa2-0004614cc33d) NASL family CGI abuses NASL id GALLERY_G2_ITEMID_DIR_TRAVERSAL.NASL description The version of Gallery hosted on the remote web server fails to sanitize user-supplied input to the last seen 2020-06-01 modified 2020-06-02 plugin id 20015 published 2005-10-18 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20015 title Gallery main.php g2_itemId Parameter Traversal Arbitrary File Access