Unrestricted file upload vulnerability in modules/gallery/models/item.php in Menalto Gallery before 3.0 and beta allows remote authenticated users with upload permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gallery | Menalto | * | 2.2.6 (including) |
Gallery | Menalto | 1.5.7 (including) | 1.5.7 (including) |
Gallery | Menalto | 1.6 (including) | 1.6 (including) |
Gallery | Menalto | 1.6-alpha3 (including) | 1.6-alpha3 (including) |
Gallery | Menalto | 2.1 (including) | 2.1 (including) |
Gallery | Menalto | 2.1.1 (including) | 2.1.1 (including) |
Gallery | Menalto | 2.1.2 (including) | 2.1.2 (including) |
Gallery | Menalto | 2.2.0 (including) | 2.2.0 (including) |
Gallery | Menalto | 2.2.1 (including) | 2.2.1 (including) |
Gallery | Menalto | 2.2.2 (including) | 2.2.2 (including) |
Gallery | Menalto | 2.2.3 (including) | 2.2.3 (including) |
Gallery | Menalto | 2.2.4 (including) | 2.2.4 (including) |
Gallery2 | Ubuntu | upstream | * |