First published: Thu Mar 09 2006(Updated: )
Directory traversal vulnerability in the session handling class (GallerySession.class) in Gallery 2 up to 2.0.2 allows remote attackers to access and delete files by specifying the session in a cookie, which is used in constructing file paths before the session value is sanitized.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gallery Project Gallery | =2.0 | |
Gallery Project Gallery | =2.0.1 | |
Gallery Project Gallery | =2.0.2 | |
Gallery Project Gallery | =2.0_alpha | |
Gallery Project Gallery | =2.0_alpha1 | |
Gallery Project Gallery | =2.0_alpha2 | |
Gallery Project Gallery | =2.0_alpha3 | |
Gallery Project Gallery | =2.0_alpha4 | |
Gallery Project Gallery | =2.0_beta1 | |
Gallery Project Gallery | =2.0_beta2 | |
Gallery Project Gallery | =2.0_beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.