First published: Tue Mar 14 2006(Updated: )
Directory traversal vulnerability in Gallery 2.0.3 and earlier, and 2.1 before RC-2a, allows remote attackers to include arbitrary PHP files via ".." (dot dot) sequences in the stepOrder parameter to (1) upgrade/index.php or (2) install/index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gallery Project Gallery | =2.0 | |
Gallery Project Gallery | =2.0.1 | |
Gallery Project Gallery | =2.0.2 | |
Gallery Project Gallery | =2.0.3 | |
Gallery Project Gallery | =2.0_alpha | |
Gallery Project Gallery | =2.0_alpha1 | |
Gallery Project Gallery | =2.0_alpha2 | |
Gallery Project Gallery | =2.0_alpha3 | |
Gallery Project Gallery | =2.0_alpha4 | |
Gallery Project Gallery | =2.0_beta1 | |
Gallery Project Gallery | =2.0_beta2 | |
Gallery Project Gallery | =2.0_beta3 | |
Gallery Project Gallery | =2.1_rc1 | |
Gallery Project Gallery | =2.1_rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.