|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200409-05] Gallery: Arbitrary command execution Vulnerability Assessment Details
|
[GLSA-200409-05] Gallery: Arbitrary command execution |
||
Gallery: Arbitrary command execution Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200409-05 (Gallery: Arbitrary command execution) The upload handling code in Gallery places uploaded files in a temporary directory. After 30 seconds, these files are deleted if they are not valid images. However, since the file exists for 30 seconds, a carefully crafted script could be initiated by the remote attacker during this 30 second timeout. Note that the temporary directory has to be located inside the webroot and a possible hacker needs to have upload rights either as an authenticated user or via "EVERYBODY". Impact A possible hacker could run arbitrary code as the user running PHP. Workaround There are several workarounds to this vulnerability: Make sure that your temporary directory is not contained in the webroot by default it is located outside the webroot. Disable upload rights to all albums for "EVERYBODY" upload is disabled by default. Disable debug and dev mode these settings are disabled by default. Disable permit_url_fopen in php.ini. References: http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0 Solution: All Gallery users should upgrade to the latest version: # emerge sync # emerge -pv ">=www-apps/gallery-1.4.4_p2" # emerge ">=www-apps/gallery-1.4.4_p2" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
Lenovo X3250 M5 1U Server Intel Xeon E3-1271V3 CPU 8GB NO HDD/OS IBM
$89.96
IBM Power8 Server S822L 12x Bay 2.5" 2x Power8 00FX518 3.42ghZ 256gb DDR3 READ
$600.00
$410.00
7875D1G - IBM Bladecenter Server 7875D1G - NEW Open Box
$400.00
IBM S822LC 8335-GCA Power 8 2U Server 2xPower8 8core/64t 128GB RAM Tested
$486.50
IBM Power8 Server S822 - 6-core 3.89GHz 128GB 93ZZ 2x PSU P8 Systems 8284-22A
$484.97
IBM P 505 1.6 GHz Server 8GB with AIX 6.2 Installed 2X 73 GB HD
$145.00
Lenovo Systems X3650 M5 Server 16GB E5-2620 V4 2.1GHz w/ Rails HDD Caddy 46C9111
$127.98
IBM Power System S922 9009-22A | 16 - Core | 96GB RAM 2U Server
$2500.00
IBM 8231-E2C Power p730 Server, 3.55GHz 16 core, 2 x EPC3, PowerVM express
$595.00
|
||
No Discussions have been posted on this vulnerability. |