 |
|
 |
|
- Readme First! - Read and follow the rules, otherwise your posts will be closed |
|
|
|
|
|
There are currently, 142 guest(s) and 0 member(s) that are online.
You are Anonymous user. You can register for free by clicking here |
|
|
|
|
|
Gallery version 1.3.3 local exploit |
|
sixonetonoffun writes "Vulnerable: gallery version 1.3.3 (other versions not tested)
Url: gallery.sf.net
Local exploit.
Gallery has a security hole where any other user on the same webserver
can create, modify or destroy photos in a given album directory.
Also Gallery requires that you turn off safe mode.
Each gallery setup needs a temp directory and an album directory.
Gallery accesses the album directory in a manner that requires
permissions of 755.
eg:
drwxr-xr-x 5 www wheel 512 Feb 9 16:02 albums
and inside albums:
ls -l
total 16
drwxrwxr-x 2 www wheel 3584 Feb 9 16:19 album01
drwxrwxr-x 2 www wheel 5120 Feb 9 16:25 album02
-rw-r--r-- 1 www wheel 65 Feb 9 16:02 albumdb.dat
-rw-r--r-- 1 www wheel 65 Feb 9 16:02 albumdb.dat.bak
-rw-r--r-- 1 www wheel 0 Feb 9 14:05 albumdb.dat.lock
-rw-r--r-- 1 www wheel 11 Feb 9 15:42 serial.dat
As a result anyone who has ever set up a gallery before can just have a
cgi running as user www (or whatever user apache is running as) move
files around.
This can be exploited with everything from SSI, perl to even php.
So on shared hosting gallery is a bad idea.
There is no fix for this as of this time.
This is a product of poor default web application security design.
--
error "
|
|
Posted on Monday, February 10 @ 10:54:56 CET by Zhen-Xjell |
|
|
|
|
| |
|
| The comments are owned by the poster. We aren't responsible for their content. |
| | | | |
No Comments Allowed for Anonymous, please register | | | | | |
|