Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 23 Sep 2008 21:22:57 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security <oss-security@...ts.openwall.com>
cc: coley@...re.org
Subject: Re: CVE Request (gallery2)


======================================================
Name: CVE-2008-3662
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3662
Reference: FULLDISC:20080918 menalto gallery: Session hijacking vulnerability, CVE-2008-3662
Reference: URL:http://seclists.org/fulldisclosure/2008/Sep/0379.html
Reference: MISC:http://int21.de/cve/CVE-2008-3662-gallery.html
Reference: CONFIRM:http://gallery.menalto.com/gallery_1.5.9_released
Reference: CONFIRM:http://gallery.menalto.com/gallery_2.2.6_released
Reference: BID:31231
Reference: URL:http://www.securityfocus.com/bid/31231

Gallery before 1.5.9, and 2.x before 2.2.6, does not set the secure
flag for the session cookie in an https session, which can cause the
cookie to be sent in http requests and make it easier for remote
attackers to capture this cookie.


======================================================
Name: CVE-2008-4129
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4129
Reference: CONFIRM:http://gallery.menalto.com/gallery_1.5.9_released
Reference: CONFIRM:http://gallery.menalto.com/gallery_2.2.6_released
Reference: BID:31231
Reference: URL:http://www.securityfocus.com/bid/31231

Gallery before 1.5.9, and 2.x before 2.2.6, does not properly handle
ZIP archives containing symbolic links, which allows remote
authenticated users to conduct directory traversal attacks and read
arbitrary files via vectors related to the archive upload (aka zip
upload) functionality.


======================================================
Name: CVE-2008-4130
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4130
Reference: CONFIRM:http://gallery.menalto.com/gallery_2.2.6_released
Reference: BID:31231
Reference: URL:http://www.securityfocus.com/bid/31231
Reference: SECUNIA:31858
Reference: URL:http://secunia.com/advisories/31858

Cross-site scripting (XSS) vulnerability in Gallery 2.x before 2.2.6
allows remote attackers to inject arbitrary web script or HTML via a
crafted Flash animation, related to the ability of the animation to
"interact with the embedding page."


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.