First published: Mon Dec 05 2005(Updated: )
The installer for Gallery 2.0 before 2.0.2 stores the install log under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gallery Project Gallery | =2.0 | |
Gallery Project Gallery | =2.0.1 | |
Gallery Project Gallery | =2.0_alpha1 | |
Gallery Project Gallery | =2.0_alpha2 | |
Gallery Project Gallery | =2.0_alpha3 | |
Gallery Project Gallery | =2.0_alpha4 | |
Gallery Project Gallery | =2.0_beta1 | |
Gallery Project Gallery | =2.0_beta2 | |
Gallery Project Gallery | =2.0_beta3 | |
Gallery Project Gallery | =2.0_rc1 | |
Gallery Project Gallery | =2.0_rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4021 has a moderate severity rating due to its exposure of sensitive information.
To fix CVE-2005-4021, ensure that the installation log is stored outside the web document root or apply the update to Gallery 2.0.2 or later.
CVE-2005-4021 affects Gallery versions 2.0 through 2.0.1, as well as various alpha, beta, and release candidate versions before 2.0.2.
CVE-2005-4021 can potentially leak sensitive installation log details that may include database credentials and other confounding configurations.
Yes, CVE-2005-4021 can be exploited remotely by attackers who can access the installation log due to insufficient access controls.