Gallery 1.3.3

From: error (errorat_private)
Date: Sun Feb 09 2003 - 16:31:37 PST

  • Next message: Paul Starzetz: "Eggdrop arbitrary connection vulnerability"

    Vulnerable: gallery version 1.3.3 (other versions not tested)
    Url: gallery.sf.net
    
    Local exploit.
    
    Gallery has a security hole where any other user on the same webserver
    can create, modify or destroy photos in a given album directory.
    
    Also Gallery requires that you turn off safe mode.
    
    Each gallery setup needs a temp directory and an album directory.
    
    Gallery accesses the album directory in a manner that requires
    permissions of 755.
    
    eg:
    drwxr-xr-x   5 www   wheel   512 Feb  9 16:02 albums
    
    and inside albums: 
    ls -l
    total 16
    drwxrwxr-x  2 www  wheel  3584 Feb  9 16:19 album01
    drwxrwxr-x  2 www  wheel  5120 Feb  9 16:25 album02
    -rw-r--r--  1 www  wheel    65 Feb  9 16:02 albumdb.dat
    -rw-r--r--  1 www  wheel    65 Feb  9 16:02 albumdb.dat.bak
    -rw-r--r--  1 www  wheel     0 Feb  9 14:05 albumdb.dat.lock
    -rw-r--r--  1 www  wheel    11 Feb  9 15:42 serial.dat
    
    As a result anyone who has ever set up a gallery before can just have a
    cgi running as user www (or whatever user apache is running as) move
    files around.
    
    This can be exploited with everything from SSI, perl to even php.
    
    So on shared hosting gallery is a bad idea.
    
    
    There is no fix for this as of this time.
    This is a product of poor default web application security design.
    
    -- 
    error <errorat_private>
    
    
    



    This archive was generated by hypermail 2b30 : Mon Feb 10 2003 - 06:27:56 PST