First published: Thu Mar 09 2006(Updated: )
Directory traversal vulnerability in the session handling class (GallerySession.class) in Gallery 2 up to 2.0.2 allows remote attackers to access and delete files by specifying the session in a cookie, which is used in constructing file paths before the session value is sanitized.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GalleryCMS | =2.0.1 | |
GalleryCMS | =2.0_alpha4 | |
GalleryCMS | =2.0_beta2 | |
GalleryCMS | =2.0.2 | |
GalleryCMS | =2.0_alpha | |
GalleryCMS | =2.0_beta1 | |
GalleryCMS | =2.0_alpha2 | |
GalleryCMS | =2.0_alpha1 | |
GalleryCMS | =2.0_beta3 | |
GalleryCMS | =2.0 | |
GalleryCMS | =2.0_alpha3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1128 is considered to be a high severity vulnerability due to the potential for unauthorized file access and deletion.
To fix CVE-2006-1128, upgrade Gallery to version 2.0.3 or later which addresses this vulnerability.
CVE-2006-1128 affects Gallery versions 2.0, 2.0.1, 2.0.2, and all alpha and beta versions up to 2.0.2.
An attacker can exploit CVE-2006-1128 to perform directory traversal attacks, gaining access to unauthorized files on the server.
No, CVE-2006-1128 can be exploited remotely without user interaction through crafted requests.