First published: Tue Mar 14 2006(Updated: )
Directory traversal vulnerability in Gallery 2.0.3 and earlier, and 2.1 before RC-2a, allows remote attackers to include arbitrary PHP files via ".." (dot dot) sequences in the stepOrder parameter to (1) upgrade/index.php or (2) install/index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GalleryCMS | =2.0.1 | |
GalleryCMS | =2.0_alpha4 | |
GalleryCMS | =2.0_beta2 | |
GalleryCMS | =2.0.2 | |
GalleryCMS | =2.0_alpha | |
GalleryCMS | =2.0_beta1 | |
GalleryCMS | =2.0_alpha2 | |
GalleryCMS | =2.0_alpha1 | |
GalleryCMS | =2.0.3 | |
GalleryCMS | =2.1_rc1 | |
GalleryCMS | =2.0_beta3 | |
GalleryCMS | =2.1_rc2 | |
GalleryCMS | =2.0 | |
GalleryCMS | =2.0_alpha3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1219 is considered to have a high severity due to its potential for remote code execution through directory traversal.
To fix CVE-2006-1219, upgrade Gallery to version 2.0.4 or 2.1 RC-2a or later.
CVE-2006-1219 affects Gallery versions 2.0.3 and earlier, as well as all versions of 2.1 prior to RC-2a.
CVE-2006-1219 can enable attackers to execute arbitrary PHP files on the server through directory traversal.
Users and administrators of affected versions of Gallery who have not upgraded are primarily impacted by CVE-2006-1219.