First published: Thu Jul 04 2013(Updated: )
A security flaw was found in the way flowplayer SWF file handling functionality of Gallery version 3, an open source project with the goal to develop and support leading photo sharing web application solutions, processed certain URL fragments passed to this file (certain URL fragments were not stripped properly when these files were called via direct URL request(s)). A remote attacker could use this flaw to conduct replay attacks. A different vulnerability than <a href="https://access.redhat.com/security/cve/CVE-2013-2138">CVE-2013-2138</a>. References: [1] <a href="http://galleryproject.org/gallery_3_0_9">http://galleryproject.org/gallery_3_0_9</a> Upstream ticket: [2] <a href="http://sourceforge.net/apps/trac/gallery/ticket/2073">http://sourceforge.net/apps/trac/gallery/ticket/2073</a> Relevant upstream patch: [3] <a href="https://github.com/gallery/gallery3/commit/c5318bb1a2dd266b50317a2adb74d74338593733">https://github.com/gallery/gallery3/commit/c5318bb1a2dd266b50317a2adb74d74338593733</a>
Affected Software | Affected Version | How to fix |
---|---|---|
NotFound Gallery |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-981197 is considered a moderate severity vulnerability affecting the flowplayer SWF file handling in Gallery version 3.
To fix REDHAT-BUG-981197, update to the latest version of the Gallery software that addresses this vulnerability.
REDHAT-BUG-981197 affects Gallery version 3, which is an open source photo sharing web application.
The vulnerability in REDHAT-BUG-981197 may allow for improper handling of certain URL fragments, potentially exposing users to security risks.
Yes, a patch or updated version that resolves REDHAT-BUG-981197 is typically made available by the Gallery project.