Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for IP spoofing in Gallery
Detailed Explanation for this Vulnerability Assessment
The remote web server contains a PHP application that is affected by
The remote host is running Gallery, a web-based photo album
application written in PHP.
The version of Gallery installed on the remote host permits a possible hacker
to spoof his IP address with a bogus 'X_FORWARDED_FOR' HTTP header.
An authenticated attacker can reportedly leverage this flaw to launch
cross-site scripting attacks by adding comments to a photo as well as
In addition, the application reportedly fails to validate a session id
before using it, which can be used to delete arbitrary files on the
remote host subject to the rights of the web server user id.
See also :
Upgrade to Gallery 2.0.3 or later.
Network Security Threat Level:
Medium / CVSS Base Score : 4.7
Networks Security ID: 16940, 16948
Vulnerability Assessment Copyright: This script is Copyright (C) 2006-2007 Tenable Network Security
|Cisco SF300-48 Refresh SRW248G4 Switch 48 Ports 2 Gigabit Ports 2 SFP
|Juniper EX-UM-2X4SFP 2-Port 10G SFP+ 4-Port 1G SFP. **** BRAND NEW ***
|Mikrotik RB260GSP 5 Gigabit Ethernet Ports and One SFP Cage
|Cisco GLC-T Compatible 1000Base T SFP
No Discussions have been posted on this vulnerability.