Vulnerable: gallery version 1.3.3 (other versions not tested) Url: gallery.sf.net Local exploit. Gallery has a security hole where any other user on the same webserver can create, modify or destroy photos in a given album directory. Also Gallery requires that you turn off safe mode. Each gallery setup needs a temp directory and an album directory. Gallery accesses the album directory in a manner that requires permissions of 755. eg: drwxr-xr-x 5 www wheel 512 Feb 9 16:02 albums and inside albums: ls -l total 16 drwxrwxr-x 2 www wheel 3584 Feb 9 16:19 album01 drwxrwxr-x 2 www wheel 5120 Feb 9 16:25 album02 -rw-r--r-- 1 www wheel 65 Feb 9 16:02 albumdb.dat -rw-r--r-- 1 www wheel 65 Feb 9 16:02 albumdb.dat.bak -rw-r--r-- 1 www wheel 0 Feb 9 14:05 albumdb.dat.lock -rw-r--r-- 1 www wheel 11 Feb 9 15:42 serial.dat As a result anyone who has ever set up a gallery before can just have a cgi running as user www (or whatever user apache is running as) move files around. This can be exploited with everything from SSI, perl to even php. So on shared hosting gallery is a bad idea. There is no fix for this as of this time. This is a product of poor default web application security design. -- error <error@lostinthenoise.net>
Attachment:
signature.asc
Description: This is a digitally signed message part