First published: Thu Jul 04 2013(Updated: )
Multiple information exposure flaws were found in the way data rest core module of Gallery version 3, an open source project with the goal to develop and support leading photo sharing web application solutions, used to previously restrict access to certain items of the photo album. A remote attacker, valid Gallery 3 user, could use this flaw to possibly obtain sensitive information (file, resize or thumb path of the item in question). References: [1] <a href="http://galleryproject.org/gallery_3_0_9">http://galleryproject.org/gallery_3_0_9</a> Upstream ticket: [2] <a href="http://sourceforge.net/apps/trac/gallery/ticket/2074">http://sourceforge.net/apps/trac/gallery/ticket/2074</a> Relevant upstream patch (against 3.0.x branch): [3] <a href="https://github.com/gallery/gallery3/commit/cbbcf1b4791762d7da0ea7b6c4f4b551a4d9caed">https://github.com/gallery/gallery3/commit/cbbcf1b4791762d7da0ea7b6c4f4b551a4d9caed</a>
Affected Software | Affected Version | How to fix |
---|---|---|
NotFound Gallery |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-981198 is classified as moderate due to multiple information exposure flaws.
To fix REDHAT-BUG-981198, update the Gallery software to the latest version where the vulnerabilities have been addressed.
The implications of REDHAT-BUG-981198 include potential unauthorized access to sensitive information within the photo albums.
Users of Gallery version 3 who have not applied security updates are affected by REDHAT-BUG-981198.
REDHAT-BUG-981198 was reported on June 15, 2014, as part of ongoing security maintenance for Gallery.