blob: 39f31e059d026c0a415df0c2e691a21169adea83 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200501-45">
<title>Gallery: Cross-site scripting vulnerability</title>
Gallery is vulnerable to cross-site scripting attacks.
<product type="ebuild">gallery</product>
<announced>January 30, 2005</announced>
<revised>May 22, 2006: 04</revised>
<package name="www-apps/gallery" auto="yes" arch="*">
<unaffected range="ge">1.4.4_p6</unaffected>
<vulnerable range="lt">1.4.4_p6</vulnerable>
Gallery is a web application written in PHP which is used to organize
and publish photo albums. It allows multiple users to build and
maintain their own albums. It also supports the mirroring of images on
other servers.
Rafel Ivgi has discovered a cross-site scripting vulnerability where
the 'username' parameter is not properly sanitized in 'login.php'.
<impact type="low">
By sending a carefully crafted URL, an attacker can inject and execute
script code in the victim's browser window, and potentially compromise
the user's gallery.
There is no known workaround at this time.
All Gallery users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-1.4.4_p6&quot;</code>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
<uri link=";name=News&amp;file=article&amp;sid=149">Gallery Announcement</uri>
<uri link="">Secunia Advisory SA13887</uri>
<uri link="">CVE-2005-0220</uri>
<metadata tag="submitter" timestamp="Sat, 22 Jan 2005 13:17:09 +0000">
<metadata tag="bugReady" timestamp="Sun, 30 Jan 2005 18:58:59 +0000">