11151643 2003-12-30 15:29 +0200 /69 rader/ The-Insider <nuritrv18@bezeqint.net>
Importerad: 2003-12-30 19:35 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <30480>
Ärende: Gallery v1.3.3 Cross Site Scripting Vulnerabillity
------------------------------------------------------------
From: "The-Insider" <nuritrv18@bezeqint.net>
To: <bugtraq@securityfocus.com>
Message-ID: <000701c3ced8$ffddf560$1792db3e@fucku>

#######################################################################

Application:    Gallery
Vendors:
http://gallery.sourceforge.net
http://gallery.menalto.com
Versions:        <= 1.3.3
Platforms:       Windows/Unix
Bug:                 Cross Site Scripting Vulnerabillity
Risk:                Low
Exploitation:   Remote with browser
Date:               30 Dec 2003
Author:            Rafel Ivgi, The-Insider
e-mail:             the_insider@mail.com
web:                http://theinsider.deep-ice.com

#######################################################################

1) Introduction
2) Bug
3) The Code

#######################################################################

===============
1) Introduction
===============


Gallery 1.3.3 is an automated php Gallery engine. It is quite secure,
and very effective as a web gallery.

#######################################################################

======
2) Bug
======

When the webserver hosting gallery 1.3.3 recieves a "GET
/<galleryfolder>/search.php" it reffers to search.php as it
should. However when searching "<script>alert('XSS')</script>" or
requests "GET
/<galleryfolder>/search.php?searchstring=<script>alert('XSS')</script>"
the server allows an attacker so inject & execute scripts.

#######################################################################

===========
3) The Code
===========

http://<host>/<galleryfolder>/search.php?searchstring=<script>alert('XSS')</
script>

#######################################################################

---
Rafel Ivgi, The-Insider
http://theinsider.deep-ice.com

"Things that are unlikeable, are NOT impossible."
(11151643) /The-Insider <nuritrv18@bezeqint.net>/(Ombruten)
Kommentar i text 11152487 av Bharat Mediratta <bharat@menalto.com>
11152487 2003-12-30 11:55 -0800 /48 rader/ Bharat Mediratta <bharat@menalto.com>
Importerad: 2003-12-30 23:41 av Brevbäraren
Extern mottagare: The-Insider <nuritrv18@bezeqint.net>
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <30483>
Kommentar till text 11151643 av The-Insider <nuritrv18@bezeqint.net>
Ärende: Re: Gallery v1.3.3 Cross Site Scripting Vulnerabillity
------------------------------------------------------------
From: "Bharat Mediratta" <bharat@menalto.com>
To: "The-Insider" <nuritrv18@bezeqint.net>,
 <bugtraq@securityfocus.com>
Message-ID: <000b01c3cf0e$d9bd9d00$6601a8c0@verity>

From: "The-Insider" <nuritrv18@bezeqint.net>
...
> #######################################################################
>
> Application:    Gallery
> Vendors:
> http://gallery.sourceforge.net
> http://gallery.menalto.com
> Versions:        <= 1.3.3
> Platforms:       Windows/Unix
> Bug:                 Cross Site Scripting Vulnerabillity
> Risk:                Low
> Exploitation:   Remote with browser
> Date:               30 Dec 2003
> Author:            Rafel Ivgi, The-Insider
> e-mail:             the_insider@mail.com
> web:                http://theinsider.deep-ice.com

5 points for finding a security flaw.  -500 for not contacting us
first, because then we could have told you that this flaw was fixed
in Gallery v1.3.4-pl1, released July 27 2002 and you could have
included that information in your security advisory.

For complete details on the bug and the bug fix, including a patch,
please read this story on our web site:

http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=82

By the way, this bug affects all versions of Gallery from v1.1 to
v1.3.4 so if you're running one of those versions of Gallery we
strongly advise you to either apply the patch in the above news
story, or upgrade to the latest version of Gallery from here:

    http://gallery.sf.net/download.php

-Bharat
Gallery Project Lead
(11152487) /Bharat Mediratta <bharat@menalto.com>/(Ombruten)