header-logo
Suggest Exploit
vendor:
Gallery
by:
Unknown
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: Gallery
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: Unknown
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Directory Traversal Vulnerability in Gallery

The Gallery application is prone to a directory traversal vulnerability. This vulnerability occurs due to the application's failure to properly sanitize user-supplied input. An attacker can exploit this vulnerability by manipulating the 'g2_itemId' parameter in the URL. By providing a crafted value, such as '/../../../../../../../etc/aliases%00', an attacker can traverse the directory structure and access sensitive files outside of the intended directory.

Mitigation:

To mitigate this vulnerability, it is recommended to apply the latest security patches and updates provided by the vendor. Additionally, input validation and sanitization techniques should be implemented to ensure that user-supplied input is properly validated and sanitized to prevent directory traversal attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15108/info

Gallery is prone to a directory traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

Exploitation of this vulnerability could lead to a loss of confidentiality. Information obtained may aid in further attacks against the underlying system; other attacks are also possible. 

http://example.com/gallery2/main.php?g2_itemId=/../../../../../../../etc/aliases%00