Gallery EXIF Data XSS

medium Nessus Plugin ID 19512

Synopsis

The remote web server contains a PHP application that is susceptible to a cross-site scripting attack.

Description

According to its banner, the version of Gallery hosted on the remote web server is prone to script insertion attacks because it does not sanitize malicious EXIF data stored in image files. Using a specially crafted image file, an attacker can exploit this flaw to cause arbitrary HTML and script code to be executed in a user's browser within the context of the affected application.

Solution

Upgrade to Gallery 1.5-pl1 / 1.5.1-RC3 or later.

See Also

https://seclists.org/bugtraq/2005/Aug/372

http://sourceforge.net/project/shownotes.php?release_id=352576

http://www.nessus.org/u?f8713d35

Plugin Details

Severity: Medium

ID: 19512

File Name: gallery_exif_xss.nasl

Version: 1.24

Type: remote

Published: 8/27/2005

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:gallery_project:gallery

Required KB Items: www/PHP, Settings/ParanoidReport, www/gallery

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 8/25/2005

Vulnerability Publication Date: 8/25/2005

Reference Information

CVE: CVE-2005-2734

BID: 14668

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990