Directory traversal vulnerability in the session handling class (GallerySession.class) in Gallery 2 up to 2.0.2 allows remote attackers to access and delete files by specifying the session in a cookie, which is used in constructing file paths before the session value is sanitized.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gallery | Gallery_project | 2.0.1 | 2.0.1 |
Gallery | Gallery_project | 2.0_alpha4 | 2.0_alpha4 |
Gallery | Gallery_project | 2.0_beta2 | 2.0_beta2 |
Gallery | Gallery_project | 2.0.2 | 2.0.2 |
Gallery | Gallery_project | 2.0_alpha | 2.0_alpha |
Gallery | Gallery_project | 2.0_beta1 | 2.0_beta1 |
Gallery | Gallery_project | 2.0_alpha2 | 2.0_alpha2 |
Gallery | Gallery_project | 2.0_alpha1 | 2.0_alpha1 |
Gallery | Gallery_project | 2.0_beta3 | 2.0_beta3 |
Gallery | Gallery_project | 2.0 | 2.0 |
Gallery | Gallery_project | 2.0_alpha3 | 2.0_alpha3 |