Gallery: Cross-site scripting vulnerability — GLSA 200501-45

Gallery is vulnerable to cross-site scripting attacks.

Affected packages

www-apps/gallery on all architectures
Affected versions < 1.4.4_p6
Unaffected versions >= 1.4.4_p6

Background

Gallery is a web application written in PHP which is used to organize and publish photo albums. It allows multiple users to build and maintain their own albums. It also supports the mirroring of images on other servers.

Description

Rafel Ivgi has discovered a cross-site scripting vulnerability where the 'username' parameter is not properly sanitized in 'login.php'.

Impact

By sending a carefully crafted URL, an attacker can inject and execute script code in the victim's browser window, and potentially compromise the user's gallery.

Workaround

There is no known workaround at this time.

Resolution

All Gallery users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.4.4_p6"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

References

Release date
January 30, 2005

Latest revision
May 22, 2006: 04

Severity
low

Exploitable
remote

Bugzilla entries