ID OPENVAS:53079 Type openvas Reporter Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com Modified 2016-09-20T00:00:00
Description
The remote host is missing an update to the system
as announced in the referenced advisory.
#
#VID 5752a0df-60c5-4876-a872-f12f9a02fa05
# OpenVAS Vulnerability Test
# $
# Description: Auto generated from vuxml or freebsd advisories
#
# Authors:
# Thomas Reinke <reinke@securityspace.com>
#
# Copyright:
# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largely excerpted from the referenced
# advisories, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_insight = "The following package is affected: gallery
CVE-2004-1106
Cross-site scripting (XSS) vulnerability in Gallery 1.4.4-pl3 and
earlier allows remote attackers to execute arbitrary web script or
HTML via 'specially formed URLs,' possibly via the include parameter
in index.php.
CVE-2005-0219
Multiple cross-site scripting (XSS) vulnerabilities in Gallery
1.3.4-pl1 allow remote attackers to inject arbitrary web script or
HTML via (1) the index field in add_comment.php, (2) set_albumName,
(3) slide_index, (4) slide_full, (5) slide_loop, (6) slide_pause, (7)
slide_dir fields in slideshow_low.php, or (8) username field in
search.php.
CVE-2005-0220
Cross-site scripting vulnerability in login.php in Gallery 1.4.4-pl2
allows remote attackers to inject arbitrary web script or HTML via the
username field.
CVE-2005-0221
Cross-site scripting (XSS) vulnerability in login.php in Gallery 2.0
Alpha allows remote attackers to inject arbitrary web script or HTML
via the g2_form[subject] field.
CVE-2005-0222
main.php in Gallery 2.0 Alpha allows remote attackers to gain
sensitive information by changing the value of g2_subView parameter,
which reveals the path in an error message.";
tag_solution = "Update your system with the appropriate patches or
software upgrades.
http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=147
http://marc.theaimsgroup.com/?l=bugtraq&m=110608459222364
http://www.vuxml.org/freebsd/5752a0df-60c5-4876-a872-f12f9a02fa05.html";
tag_summary = "The remote host is missing an update to the system
as announced in the referenced advisory.";
if(description)
{
script_id(53079);
script_version("$Revision: 4118 $");
script_tag(name:"last_modification", value:"$Date: 2016-09-20 07:32:38 +0200 (Tue, 20 Sep 2016) $");
script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
script_cve_id("CVE-2004-1106", "CVE-2005-0219", "CVE-2005-0220", "CVE-2005-0221", "CVE-2005-0222");
script_bugtraq_id(11602);
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_name("FreeBSD Ports: gallery");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com");
script_family("FreeBSD Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/freebsdrel", "login/SSH/success");
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-bsd.inc");
txt = "";
vuln = 0;
bver = portver(pkg:"gallery");
if(!isnull(bver) && revcomp(a:bver, b:"1.4.4.5")<0) {
txt += 'Package gallery version ' + bver + ' is installed which is known to be vulnerable.\n';
vuln = 1;
}
if(vuln) {
security_message(data:string(txt));
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"id": "OPENVAS:53079", "type": "openvas", "bulletinFamily": "scanner", "title": "FreeBSD Ports: gallery", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "published": "2008-09-04T00:00:00", "modified": "2016-09-20T00:00:00", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=53079", "reporter": "Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com", "references": [], "cvelist": ["CVE-2005-0219", "CVE-2005-0222", "CVE-2005-0221", "CVE-2004-1106", "CVE-2005-0220"], "lastseen": "2017-07-02T21:10:13", "viewCount": 115, "enchantments": {"score": {"value": 5.7, "vector": "NONE", "modified": "2017-07-02T21:10:13", "rev": 2}, "dependencies": {"references": [{"type": "nessus", "idList": ["GALLERY_MULTIPLE_ISSUES.NASL", "GENTOO_GLSA-200411-10.NASL", "FREEBSD_PKG_5752A0DF60C54876A872F12F9A02FA05.NASL", "GALLERY_HTML_INJECTION.NASL", "DEBIAN_DSA-642.NASL", "GENTOO_GLSA-200501-45.NASL"]}, {"type": "freebsd", "idList": ["5752A0DF-60C5-4876-A872-F12F9A02FA05"]}, {"type": "cve", "idList": ["CVE-2005-0219", "CVE-2005-0220", "CVE-2005-0222", "CVE-2004-1106", "CVE-2005-0221"]}, {"type": "openvas", "idList": ["OPENVAS:53744", "OPENVAS:54731", "OPENVAS:54831"]}, {"type": "osvdb", "idList": ["OSVDB:13029", "OSVDB:13034", "OSVDB:11340", "OSVDB:13032", "OSVDB:13031", "OSVDB:13030", "OSVDB:13922"]}, {"type": "gentoo", "idList": ["GLSA-200501-45", "GLSA-200411-10"]}, {"type": "debian", "idList": ["DEBIAN:DSA-642-1:B598A"]}], "modified": "2017-07-02T21:10:13", "rev": 2}, "vulnersScore": 5.7}, "pluginID": "53079", "sourceData": "#\n#VID 5752a0df-60c5-4876-a872-f12f9a02fa05\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: gallery\n\nCVE-2004-1106\nCross-site scripting (XSS) vulnerability in Gallery 1.4.4-pl3 and\nearlier allows remote attackers to execute arbitrary web script or\nHTML via 'specially formed URLs,' possibly via the include parameter\nin index.php.\n\nCVE-2005-0219\nMultiple cross-site scripting (XSS) vulnerabilities in Gallery\n1.3.4-pl1 allow remote attackers to inject arbitrary web script or\nHTML via (1) the index field in add_comment.php, (2) set_albumName,\n(3) slide_index, (4) slide_full, (5) slide_loop, (6) slide_pause, (7)\nslide_dir fields in slideshow_low.php, or (8) username field in\nsearch.php.\n\nCVE-2005-0220\nCross-site scripting vulnerability in login.php in Gallery 1.4.4-pl2\nallows remote attackers to inject arbitrary web script or HTML via the\nusername field.\n\nCVE-2005-0221\nCross-site scripting (XSS) vulnerability in login.php in Gallery 2.0\nAlpha allows remote attackers to inject arbitrary web script or HTML\nvia the g2_form[subject] field.\n\nCVE-2005-0222\nmain.php in Gallery 2.0 Alpha allows remote attackers to gain\nsensitive information by changing the value of g2_subView parameter,\nwhich reveals the path in an error message.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=147\nhttp://marc.theaimsgroup.com/?l=bugtraq&m=110608459222364\nhttp://www.vuxml.org/freebsd/5752a0df-60c5-4876-a872-f12f9a02fa05.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(53079);\n script_version(\"$Revision: 4118 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-20 07:32:38 +0200 (Tue, 20 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2004-1106\", \"CVE-2005-0219\", \"CVE-2005-0220\", \"CVE-2005-0221\", \"CVE-2005-0222\");\n script_bugtraq_id(11602);\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"FreeBSD Ports: gallery\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"gallery\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.4.4.5\")<0) {\n txt += 'Package gallery version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "naslFamily": "FreeBSD Local Security Checks"}
{"nessus": [{"lastseen": "2021-01-07T10:43:50", "description": "Gallery includes several cross-site scripting vulnerabilities that\ncould allow malicious content to be injected.", "edition": 25, "published": "2005-07-13T00:00:00", "title": "FreeBSD : gallery -- XSS (5752a0df-60c5-4876-a872-f12f9a02fa05)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0219", "CVE-2005-0222", "CVE-2005-0221", "CVE-2004-1106", "CVE-2005-0220"], "modified": "2005-07-13T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:gallery"], "id": "FREEBSD_PKG_5752A0DF60C54876A872F12F9A02FA05.NASL", "href": "https://www.tenable.com/plugins/nessus/18940", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(18940);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2004-1106\", \"CVE-2005-0219\", \"CVE-2005-0220\", \"CVE-2005-0221\", \"CVE-2005-0222\");\n script_bugtraq_id(11602);\n\n script_name(english:\"FreeBSD : gallery -- XSS (5752a0df-60c5-4876-a872-f12f9a02fa05)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gallery includes several cross-site scripting vulnerabilities that\ncould allow malicious content to be injected.\"\n );\n # http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=147\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0a9f3560\"\n );\n # http://marc.theaimsgroup.com/?l=bugtraq&m=110608459222364\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://marc.info/?l=bugtraq&m=110608459222364\"\n );\n # https://vuxml.freebsd.org/freebsd/5752a0df-60c5-4876-a872-f12f9a02fa05.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9995dd83\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:gallery\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/01/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/06/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/07/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"gallery<1.4.4.5\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T10:03:12", "description": "Several vulnerabilities have been discovered in gallery, a web-based\nphoto album written in PHP4. The Common Vulnerabilities and Exposures\nproject identifies the following vulnerabilities :\n\n - CAN-2004-1106\n Jim Paris discovered a cross site scripting\n vulnerability which allows code to be inserted by using\n specially formed URLs.\n\n - CVE-NOMATCH\n\n The upstream developers of gallery have fixed several\n cases of possible variable injection that could trick\n gallery to unintended actions, e.g. leaking database\n passwords.", "edition": 26, "published": "2005-01-17T00:00:00", "title": "Debian DSA-642-1 : gallery - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1106"], "modified": "2005-01-17T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:3.0", "p-cpe:/a:debian:debian_linux:gallery"], "id": "DEBIAN_DSA-642.NASL", "href": "https://www.tenable.com/plugins/nessus/16182", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-642. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(16182);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2004-1106\");\n script_bugtraq_id(11602);\n script_xref(name:\"DSA\", value:\"642\");\n\n script_name(english:\"Debian DSA-642-1 : gallery - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in gallery, a web-based\nphoto album written in PHP4. The Common Vulnerabilities and Exposures\nproject identifies the following vulnerabilities :\n\n - CAN-2004-1106\n Jim Paris discovered a cross site scripting\n vulnerability which allows code to be inserted by using\n specially formed URLs.\n\n - CVE-NOMATCH\n\n The upstream developers of gallery have fixed several\n cases of possible variable injection that could trick\n gallery to unintended actions, e.g. leaking database\n passwords.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-642\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the gallery package.\n\nFor the stable distribution (woody) these problems have been fixed in\nversion 1.2.5-8woody3.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:gallery\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/01/17\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/11/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.0\", prefix:\"gallery\", reference:\"1.2.5-8woody3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:51:52", "description": "The remote host is affected by the vulnerability described in GLSA-200411-10\n(Gallery: XSS vulnerability)\n\n Jim Paris has discovered a cross-site scripting vulnerability in\n Gallery.\n \nImpact :\n\n By sending a carefully crafted URL, an attacker can inject and execute\n script code in the victim's browser window, and potentially compromise\n the users gallery.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 26, "published": "2004-11-07T00:00:00", "title": "GLSA-200411-10 : Gallery: XSS vulnerability", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1106"], "modified": "2004-11-07T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:gallery"], "id": "GENTOO_GLSA-200411-10.NASL", "href": "https://www.tenable.com/plugins/nessus/15644", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200411-10.\n#\n# The advisory text is Copyright (C) 2001-2017 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(15644);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2004-1106\");\n script_xref(name:\"GLSA\", value:\"200411-10\");\n\n script_name(english:\"GLSA-200411-10 : Gallery: XSS vulnerability\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200411-10\n(Gallery: XSS vulnerability)\n\n Jim Paris has discovered a cross-site scripting vulnerability in\n Gallery.\n \nImpact :\n\n By sending a carefully crafted URL, an attacker can inject and execute\n script code in the victim's browser window, and potentially compromise\n the users gallery.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n # http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=142&mode=thread&order=0&thold=0\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fb64223f\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200411-10\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Gallery users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-apps/gallery-1.4.4_p4'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:gallery\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/11/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/11/07\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/11/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-apps/gallery\", unaffected:make_list(\"ge 1.4.4_p4\"), vulnerable:make_list(\"lt 1.4.4_p4\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Gallery\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T10:59:00", "description": "The remote web server has a version of Gallery that could allow an\nattacker to inject arbitrary HTML tags via unspecified vectors.", "edition": 26, "published": "2004-11-04T00:00:00", "title": "Gallery Unspecified HTML Injection", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1106"], "modified": "2004-11-04T00:00:00", "cpe": ["cpe:/a:gallery_project:gallery"], "id": "GALLERY_HTML_INJECTION.NASL", "href": "https://www.tenable.com/plugins/nessus/15624", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(15624);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2004-1106\");\n script_bugtraq_id(11602);\n\n script_name(english:\"Gallery Unspecified HTML Injection\");\n script_summary(english:\"Checks for the version of Gallery\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote web server is running a PHP application that is affected by\nan HTML injection vulnerability.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote web server has a version of Gallery that could allow an\nattacker to inject arbitrary HTML tags via unspecified vectors.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://galleryproject.org/node/142\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Gallery 1.4.4-pl3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:ND/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/11/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/11/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/11/04\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:gallery_project:gallery\");\n script_end_attributes();\n\n script_category(ACT_ATTACK);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.\");\n\n script_dependencie(\"gallery_detect.nasl\");\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n script_require_keys(\"www/gallery\", \"www/PHP\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 80);\n\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"webapp_func.inc\");\n\nport = get_http_port(default:80, php:TRUE);\n\ninstall = get_install_from_kb(\n appname : \"gallery\",\n port : port,\n exit_on_fail : TRUE\n);\n\ndir = install[\"dir\"];\nversion = install[\"ver\"];\ninstall_url = build_url(port:port, qs:dir);\n\nif (version == UNKNOWN_VER) audit(AUDIT_UNKNOWN_WEB_APP_VER, \"Gallery\", install_url);\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\n# Versions < 1.4.4-pl3 are affected\nif (\n version =~ \"^0\\.\" ||\n version =~ \"^1\\.([0-3]|4\\.([0-3]|4$|4-pl[0-2]))([^0-9]|$)\"\n)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n URL : ' +install_url+\n '\\n Installed version : ' +version+\n '\\n Fixed version : 1.4.4-pl3\\n';\n security_warning(port:port, extra:report);\n }\n else security_warning(port);\n}\nelse audit(AUDIT_WEB_APP_NOT_AFFECTED, \"Gallery\", install_url, version);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:51:54", "description": "The remote host is affected by the vulnerability described in GLSA-200501-45\n(Gallery: XSS vulnerability)\n\n Rafel Ivgi has discovered a cross-site scripting vulnerability where\n the 'username' parameter is not properly sanitized in 'login.php'.\n \nImpact :\n\n By sending a carefully crafted URL, an attacker can inject and execute\n script code in the victim's browser window, and potentially compromise\n the user's gallery.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 27, "published": "2005-02-14T00:00:00", "title": "GLSA-200501-45 : Gallery: XSS vulnerability", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0220"], "modified": "2005-02-14T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:gallery"], "id": "GENTOO_GLSA-200501-45.NASL", "href": "https://www.tenable.com/plugins/nessus/16436", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200501-45.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(16436);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2005-0220\");\n script_xref(name:\"GLSA\", value:\"200501-45\");\n\n script_name(english:\"GLSA-200501-45 : Gallery: XSS vulnerability\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200501-45\n(Gallery: XSS vulnerability)\n\n Rafel Ivgi has discovered a cross-site scripting vulnerability where\n the 'username' parameter is not properly sanitized in 'login.php'.\n \nImpact :\n\n By sending a carefully crafted URL, an attacker can inject and execute\n script code in the victim's browser window, and potentially compromise\n the user's gallery.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n # http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=149\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?335f9d0c\"\n );\n # http://secunia.com/advisories/13887/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://secuniaresearch.flexerasoftware.com/advisories/13887/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200501-45\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Gallery users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-apps/gallery-1.4.4_p6'\n Note: Users with the vhosts USE flag set should manually use\n webapp-config to finalize the update.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:gallery\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/01/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/02/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-apps/gallery\", unaffected:make_list(\"ge 1.4.4_p6\"), vulnerable:make_list(\"lt 1.4.4_p6\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Gallery\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-20T10:59:00", "description": "The version of Gallery hosted on the remote web server is affected by a\ncross-site scripting vulnerability because it fails to properly sanitize\nuser-supplied input to the 'username' parameter of the 'login.php'\nscript. An attacker could exploit this flaw to inject arbitrary HTML\nand script code into a user's browser to be executed within the security\ncontext of the affected site. \n\nNote that the application is reportedly affected by multiple additional\ncross-site scripting vulnerabilities as well as an information\ndisclosure vulnerability, although Nessus has not tested for these.", "edition": 29, "published": "2005-01-18T00:00:00", "title": "Gallery login.php username Parameter XSS", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0220"], "modified": "2005-01-18T00:00:00", "cpe": ["cpe:/a:gallery_project:gallery"], "id": "GALLERY_MULTIPLE_ISSUES.NASL", "href": "https://www.tenable.com/plugins/nessus/16185", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(16185);\n script_version(\"1.24\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2005-0220\");\n script_bugtraq_id(12292, 12286);\n\n script_name(english:\"Gallery login.php username Parameter XSS\");\n script_summary(english:\"Attempts to inject script code via login.php\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote web server is running a PHP application that is affected by\na cross-site scripting vulnerability.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The version of Gallery hosted on the remote web server is affected by a\ncross-site scripting vulnerability because it fails to properly sanitize\nuser-supplied input to the 'username' parameter of the 'login.php'\nscript. An attacker could exploit this flaw to inject arbitrary HTML\nand script code into a user's browser to be executed within the security\ncontext of the affected site. \n\nNote that the application is reportedly affected by multiple additional\ncross-site scripting vulnerabilities as well as an information\ndisclosure vulnerability, although Nessus has not tested for these.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"https://seclists.org/bugtraq/2005/Jan/210\");\n script_set_attribute(attribute:\"see_also\", value:\"http://galleryproject.org/node/147\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Gallery 1.4.4-pl5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/01/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/01/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:gallery_project:gallery\");\n script_end_attributes();\n\n script_category(ACT_ATTACK);\n script_family(english:\"CGI abuses : XSS\");\n\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n\n script_dependencies(\"gallery_detect.nasl\", \"cross_site_scripting.nasl\");\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n script_require_keys(\"www/gallery\", \"www/PHP\");\n script_require_ports(\"Services/www\", 80);\n\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"webapp_func.inc\");\n\nport = get_http_port(default:80, php:TRUE);\n\ninstall = get_install_from_kb(\n appname : \"gallery\",\n port : port,\n exit_on_fail : TRUE\n);\n\ndir = install[\"dir\"];\n\nif (get_kb_item(string(\"www/\", port, \"/generic_xss\"))) exit(0);\n\nexploit = '\"<script>' + SCRIPT_NAME + '</script';\n\nres = http_send_recv3(\n method : \"GET\",\n item : dir + '?username=' + exploit,\n port : port,\n exit_on_fail : TRUE\n);\n\nif ('<input type=text name=\"username\" value=\"\"<script>' + SCRIPT_NAME + '</script>\"' >< res[2])\n{\n set_kb_item(name:'www/'+port+'/XSS', value:TRUE);\n security_warning(port);\n}\nelse audit(AUDIT_WEB_APP_NOT_AFFECTED, \"Gallery\", build_url(qs:dir, port:port));\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:57", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0219", "CVE-2005-0222", "CVE-2005-0221", "CVE-2004-1106", "CVE-2005-0220"], "description": "\nGallery includes several cross-site scripting vulnerabilities\n\t that could allow malicious content to be injected.\n", "edition": 4, "modified": "2005-01-26T00:00:00", "published": "2005-01-26T00:00:00", "id": "5752A0DF-60C5-4876-A872-F12F9A02FA05", "href": "https://vuxml.freebsd.org/freebsd/5752a0df-60c5-4876-a872-f12f9a02fa05.html", "title": "gallery -- cross-site scripting", "type": "freebsd", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2020-10-03T11:33:40", "description": "Cross-site scripting (XSS) vulnerability in Gallery 1.4.4-pl3 and earlier allows remote attackers to execute arbitrary web script or HTML via \"specially formed URLs,\" possibly via the include parameter in index.php.", "edition": 3, "cvss3": {}, "published": "2005-01-10T05:00:00", "title": "CVE-2004-1106", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2004-1106"], "modified": "2017-07-11T01:30:00", "cpe": ["cpe:/a:gallery_project:gallery:1.4.3_pl1", "cpe:/a:gallery_project:gallery:1.4.2", "cpe:/a:gallery_project:gallery:1.4.3_pl2", "cpe:/a:gallery_project:gallery:1.4.1", "cpe:/o:gentoo:linux:*", "cpe:/a:gallery_project:gallery:1.4_pl1", "cpe:/a:gallery_project:gallery:1.4", "cpe:/a:gallery_project:gallery:1.4_pl2"], "id": "CVE-2004-1106", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1106", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:gallery_project:gallery:1.4_pl2:*:*:*:*:*:*:*", "cpe:2.3:a:gallery_project:gallery:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gallery_project:gallery:1.4_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:gallery_project:gallery:1.4.3_pl1:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe:2.3:a:gallery_project:gallery:1.4.3_pl2:*:*:*:*:*:*:*", "cpe:2.3:a:gallery_project:gallery:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gallery_project:gallery:1.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:52", "description": "Multiple cross-site scripting (XSS) vulnerabilities in Gallery 1.3.4-pl1 allow remote attackers to inject arbitrary web script or HTML via (1) the index field in add_comment.php, (2) set_albumName, (3) slide_index, (4) slide_full, (5) slide_loop, (6) slide_pause, (7) slide_dir fields in slideshow_low.php, or (8) username field in search.php.", "edition": 3, "cvss3": {}, "published": "2005-05-02T04:00:00", "title": "CVE-2005-0219", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-0219"], "modified": "2017-07-11T01:32:00", "cpe": ["cpe:/a:gallery_project:gallery:1.3.4_pl1"], "id": "CVE-2005-0219", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0219", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:gallery_project:gallery:1.3.4_pl1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:52", "description": "Cross-site scripting vulnerability in login.php in Gallery 1.4.4-pl2 allows remote attackers to inject arbitrary web script or HTML via the username field.", "edition": 3, "cvss3": {}, "published": "2005-05-02T04:00:00", "title": "CVE-2005-0220", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-0220"], "modified": "2017-07-11T01:32:00", "cpe": ["cpe:/a:gallery_project:gallery:1.4.4_pl2"], "id": "CVE-2005-0220", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0220", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:gallery_project:gallery:1.4.4_pl2:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:52", "description": "main.php in Gallery 2.0 Alpha allows remote attackers to gain sensitive information by changing the value of g2_subView parameter, which reveals the path in an error message.", "edition": 3, "cvss3": {}, "published": "2005-05-02T04:00:00", "title": "CVE-2005-0222", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-0222"], "modified": "2017-07-11T01:32:00", "cpe": ["cpe:/a:gallery_project:gallery:2.0_alpha"], "id": "CVE-2005-0222", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0222", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:gallery_project:gallery:2.0_alpha:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:52", "description": "Cross-site scripting (XSS) vulnerability in login.php in Gallery 2.0 Alpha allows remote attackers to inject arbitrary web script or HTML via the g2_form[subject] field.", "edition": 3, "cvss3": {}, "published": "2005-01-17T05:00:00", "title": "CVE-2005-0221", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-0221"], "modified": "2017-07-11T01:32:00", "cpe": ["cpe:/a:gallery_project:gallery:2.0_alpha"], "id": "CVE-2005-0221", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0221", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:gallery_project:gallery:2.0_alpha:*:*:*:*:*:*:*"]}], "gentoo": [{"lastseen": "2016-09-06T19:47:03", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1106"], "description": "### Background\n\nGallery is a web application written in PHP which is used to organize and publish photo albums. It allows multiple users to build and maintain their own albums. It also supports the mirroring of images on other servers. \n\n### Description\n\nJim Paris has discovered a cross-site scripting vulnerability in Gallery. \n\n### Impact\n\nBy sending a carefully crafted URL, an attacker can inject and execute script code in the victim's browser window, and potentially compromise the users gallery. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Gallery users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-apps/gallery-1.4.4_p4\"", "edition": 1, "modified": "2006-05-22T00:00:00", "published": "2004-11-06T00:00:00", "id": "GLSA-200411-10", "href": "https://security.gentoo.org/glsa/200411-10", "type": "gentoo", "title": "Gallery: Cross-site scripting vulnerability", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-06T19:46:54", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0220"], "description": "### Background\n\nGallery is a web application written in PHP which is used to organize and publish photo albums. It allows multiple users to build and maintain their own albums. It also supports the mirroring of images on other servers. \n\n### Description\n\nRafel Ivgi has discovered a cross-site scripting vulnerability where the 'username' parameter is not properly sanitized in 'login.php'. \n\n### Impact\n\nBy sending a carefully crafted URL, an attacker can inject and execute script code in the victim's browser window, and potentially compromise the user's gallery. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Gallery users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-apps/gallery-1.4.4_p6\"\n\nNote: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.", "edition": 1, "modified": "2006-05-22T00:00:00", "published": "2005-01-30T00:00:00", "id": "GLSA-200501-45", "href": "https://security.gentoo.org/glsa/200501-45", "type": "gentoo", "title": "Gallery: Cross-site scripting vulnerability", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:06", "bulletinFamily": "software", "cvelist": ["CVE-2004-1106"], "edition": 1, "description": "## Vulnerability Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate variables upon submission. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nUpgrade to version 1.4.4-pl3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate variables upon submission. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## References:\nVendor URL: http://gallery.sourceforge.net/\nVendor Specific News/Changelog Entry: http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=142&mode=thread&order=0&thold=0\nVendor Specific News/Changelog Entry: http://sourceforge.net/forum/forum.php?forum_id=419708\n[Vendor Specific Advisory URL](http://www.debian.org/security/2005/dsa-642)\nSecurity Tracker: 1012064\n[Secunia Advisory ID:13071](https://secuniaresearch.flexerasoftware.com/advisories/13071/)\n[Secunia Advisory ID:13889](https://secuniaresearch.flexerasoftware.com/advisories/13889/)\n[Secunia Advisory ID:13105](https://secuniaresearch.flexerasoftware.com/advisories/13105/)\nOther Advisory URL: http://security.gentoo.org/glsa/glsa-200411-10.xml\nOther Advisory URL: http://sourceforge.net/project/shownotes.php?release_id=279821\nISS X-Force ID: 17948\n[CVE-2004-1106](https://vulners.com/cve/CVE-2004-1106)\nBugtraq ID: 11602\n", "modified": "2004-11-02T23:33:44", "published": "2004-11-02T23:33:44", "id": "OSVDB:11340", "href": "https://vulners.com/osvdb/OSVDB:11340", "title": "Gallery Unspecified XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:08", "bulletinFamily": "software", "cvelist": ["CVE-2005-0219"], "edition": 1, "description": "## Vulnerability Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate multiple variables upon submission to the slideshow_low.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nUpgrade to version 1.4.4-pl6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate multiple variables upon submission to the slideshow_low.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[victim]/gallery/slideshow_low.php?set_albumName=A-Or&slide_\nindex=3&slide_full=0\"><script>alert()</script>&slide_loop=0&slide_pause=3&slide_dir=1\n## References:\nVendor URL: http://gallery.sourceforge.net\n[Related OSVDB ID: 13031](https://vulners.com/osvdb/OSVDB:13031)\n[Related OSVDB ID: 13029](https://vulners.com/osvdb/OSVDB:13029)\n[Related OSVDB ID: 13032](https://vulners.com/osvdb/OSVDB:13032)\n[Related OSVDB ID: 13033](https://vulners.com/osvdb/OSVDB:13033)\n[Related OSVDB ID: 13034](https://vulners.com/osvdb/OSVDB:13034)\nOther Advisory URL: http://theinsider.deep-ice.com/texts/advisory69.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-01/0380.html\n[CVE-2005-0219](https://vulners.com/cve/CVE-2005-0219)\n", "modified": "2005-01-17T09:20:41", "published": "2005-01-17T09:20:41", "id": "OSVDB:13030", "href": "https://vulners.com/osvdb/OSVDB:13030", "title": "Gallery slideshow_low.php Multiple Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:08", "bulletinFamily": "software", "cvelist": ["CVE-2005-0219"], "edition": 1, "description": "## Vulnerability Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the \"searchstring\" variable upon submission to the search.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nUpgrade to version 1.4.4-pl6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the \"searchstring\" variable upon submission to the search.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[victim]/gallery/search.php?searchstring=%22%20onactivate%3D\"alert%28%29\"\n## References:\nVendor URL: http://gallery.sourceforge.net\n[Related OSVDB ID: 13030](https://vulners.com/osvdb/OSVDB:13030)\n[Related OSVDB ID: 13029](https://vulners.com/osvdb/OSVDB:13029)\n[Related OSVDB ID: 13032](https://vulners.com/osvdb/OSVDB:13032)\n[Related OSVDB ID: 13033](https://vulners.com/osvdb/OSVDB:13033)\n[Related OSVDB ID: 13034](https://vulners.com/osvdb/OSVDB:13034)\nOther Advisory URL: http://theinsider.deep-ice.com/texts/advisory69.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-01/0380.html\n[CVE-2005-0219](https://vulners.com/cve/CVE-2005-0219)\n", "modified": "2005-01-17T09:20:41", "published": "2005-01-17T09:20:41", "href": "https://vulners.com/osvdb/OSVDB:13031", "id": "OSVDB:13031", "title": "Gallery search.php searchstring Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:08", "bulletinFamily": "software", "cvelist": ["CVE-2005-0219"], "edition": 1, "description": "## Vulnerability Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate index variables upon submission to the add_comment.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nUpgrade to version 1.4.4-pl6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate index variables upon submission to the add_comment.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[victim]/gallery/add_comment.php?set_albumName=Eros&index=1\"><script>alert()</script>\n## References:\nVendor URL: http://gallery.sourceforge.net\n[Related OSVDB ID: 13030](https://vulners.com/osvdb/OSVDB:13030)\n[Related OSVDB ID: 13031](https://vulners.com/osvdb/OSVDB:13031)\n[Related OSVDB ID: 13032](https://vulners.com/osvdb/OSVDB:13032)\n[Related OSVDB ID: 13033](https://vulners.com/osvdb/OSVDB:13033)\n[Related OSVDB ID: 13034](https://vulners.com/osvdb/OSVDB:13034)\nOther Advisory URL: http://theinsider.deep-ice.com/texts/advisory69.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-01/0380.html\n[CVE-2005-0219](https://vulners.com/cve/CVE-2005-0219)\n", "modified": "2005-01-17T09:20:41", "published": "2005-01-17T09:20:41", "href": "https://vulners.com/osvdb/OSVDB:13029", "id": "OSVDB:13029", "title": "Gallery add_comment.php index Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:08", "bulletinFamily": "software", "cvelist": ["CVE-2005-0220"], "edition": 1, "description": "## Vulnerability Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the \"username\" variable upon submission to the login.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nUpgrade to version 1.4.4-pl6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the \"username\" variable upon submission to the login.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[victim]/gallery/login.php?gallery_popup=true&username=/*%22*/%20\nonactivate%3Dalert%28%29%3e\n## References:\nVendor URL: http://gallery.sourceforge.net\n[Secunia Advisory ID:13887](https://secuniaresearch.flexerasoftware.com/advisories/13887/)\n[Secunia Advisory ID:14069](https://secuniaresearch.flexerasoftware.com/advisories/14069/)\n[Related OSVDB ID: 13030](https://vulners.com/osvdb/OSVDB:13030)\n[Related OSVDB ID: 13031](https://vulners.com/osvdb/OSVDB:13031)\n[Related OSVDB ID: 13029](https://vulners.com/osvdb/OSVDB:13029)\n[Related OSVDB ID: 13033](https://vulners.com/osvdb/OSVDB:13033)\n[Related OSVDB ID: 13034](https://vulners.com/osvdb/OSVDB:13034)\nOther Advisory URL: http://security.gentoo.org/glsa/glsa-200501-45.xml\nOther Advisory URL: http://theinsider.deep-ice.com/texts/advisory69.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-01/0380.html\n[CVE-2005-0220](https://vulners.com/cve/CVE-2005-0220)\n", "modified": "2005-01-17T09:20:41", "published": "2005-01-17T09:20:41", "id": "OSVDB:13032", "href": "https://vulners.com/osvdb/OSVDB:13032", "title": "Gallery login.php username Variable XSS", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:08", "bulletinFamily": "software", "cvelist": ["CVE-2005-0222"], "edition": 1, "description": "## Vulnerability Description\nGallery contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a specially crafted URL is submitted to main.php, which will disclose installation path information resulting in a loss of confidentiality.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nGallery contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a specially crafted URL is submitted to main.php, which will disclose installation path information resulting in a loss of confidentiality.\n## Manual Testing Notes\nhttp://[victim]/g2/main.php?g2_return= http://<valid host>/main.php%3Fg2_view%3Dcore%3AShowItem%26g2_itemId%3D7150%26g2_GALLERYSID%3D< any valid/invalid session id such as:be869b98355e8d445c8ec8f97cb343da>&g2_view=core:UserAdmin&g2_subView=core:UserAdmin\n## References:\nVendor URL: http://gallery.sourceforge.net\n[Related OSVDB ID: 13030](https://vulners.com/osvdb/OSVDB:13030)\n[Related OSVDB ID: 13031](https://vulners.com/osvdb/OSVDB:13031)\n[Related OSVDB ID: 13029](https://vulners.com/osvdb/OSVDB:13029)\n[Related OSVDB ID: 13032](https://vulners.com/osvdb/OSVDB:13032)\n[Related OSVDB ID: 13033](https://vulners.com/osvdb/OSVDB:13033)\nOther Advisory URL: http://theinsider.deep-ice.com/texts/advisory69.txt\n[CVE-2005-0222](https://vulners.com/cve/CVE-2005-0222)\n", "modified": "2005-01-17T09:20:41", "published": "2005-01-17T09:20:41", "id": "OSVDB:13034", "href": "https://vulners.com/osvdb/OSVDB:13034", "title": "Gallery main.php Path Disclosure", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:09", "bulletinFamily": "software", "cvelist": ["CVE-2005-0221"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nMail List Post: http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0031.html\nISS X-Force ID: 18938\n[CVE-2005-0221](https://vulners.com/cve/CVE-2005-0221)\n", "modified": "2005-01-17T00:00:00", "published": "2005-01-17T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:13922", "id": "OSVDB:13922", "title": "Gallery login.php g2_form[subject] XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "openvas": [{"lastseen": "2017-07-24T12:50:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1106"], "description": "The remote host is missing an update to gallery\nannounced via advisory DSA 642-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:53744", "href": "http://plugins.openvas.org/nasl.php?oid=53744", "type": "openvas", "title": "Debian Security Advisory DSA 642-1 (gallery)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_642_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 642-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several vulnerabilities have been discovered in gallery, a web-based\nphoto album written in PHP4. The Common Vulnerabilities and Exposures\nproject identifies the following vulnerabilities:\n\nCVE-2004-1106\n\nJim Paris discovered a cross site scripting vulnerability which\nallows code to be inserted by using specially formed URLs.\n\nCVE-NOMATCH\n\nThe upstream developers of gallery have fixed several cases of\npossible variable injection that could trick gallery to unintended\nactions, e.g. leaking database passwords.\n\nFor the stable distribution (woody) these problems have been fixed in\nversion 1.2.5-8woody3.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.4.4-pl4-1.\n\nWe recommend that you upgrade your gallery package.\";\ntag_summary = \"The remote host is missing an update to gallery\nannounced via advisory DSA 642-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20642-1\";\n\nif(description)\n{\n script_id(53744);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 22:56:38 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-1106\");\n script_bugtraq_id(11602);\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 642-1 (gallery)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"gallery\", ver:\"1.2.5-8woody3\", rls:\"DEB3.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:49:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1106"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200411-10.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:54731", "href": "http://plugins.openvas.org/nasl.php?oid=54731", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200411-10 (gallery)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Gallery is vulnerable to cross-site scripting attacks.\";\ntag_solution = \"All Gallery users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-apps/gallery-1.4.4_p4'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200411-10\nhttp://bugs.gentoo.org/show_bug.cgi?id=69904\nhttp://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=142&mode=thread&order=0&thold=0\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200411-10.\";\n\n \n\nif(description)\n{\n script_id(54731);\n script_cve_id(\"CVE-2004-1106\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_name(\"Gentoo Security Advisory GLSA 200411-10 (gallery)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"www-apps/gallery\", unaffected: make_list(\"ge 1.4.4_p4\"), vulnerable: make_list(\"lt 1.4.4_p4\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0220"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200501-45.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:54831", "href": "http://plugins.openvas.org/nasl.php?oid=54831", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200501-45 (gallery)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Gallery is vulnerable to cross-site scripting attacks.\";\ntag_solution = \"All Gallery users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-apps/gallery-1.4.4_p6'\n\nNote: Users with the vhosts USE flag set should manually use webapp-config\nto finalize the update.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200501-45\nhttp://bugs.gentoo.org/show_bug.cgi?id=78522\nhttp://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=149\nhttp://secunia.com/advisories/13887/\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200501-45.\";\n\n \n\nif(description)\n{\n script_id(54831);\n script_cve_id(\"CVE-2005-0220\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_name(\"Gentoo Security Advisory GLSA 200501-45 (gallery)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"www-apps/gallery\", unaffected: make_list(\"ge 1.4.4_p6\"), vulnerable: make_list(\"lt 1.4.4_p6\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "debian": [{"lastseen": "2019-05-30T02:22:29", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1106"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 642-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nJanuary 17th, 2005 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : gallery\nVulnerability : several\nProblem-Type : remote\nDebian-specific: no\nCVE ID : CAN-2004-1106\nBugTraq ID : 11602\n\nSeveral vulnerabilities have been discovered in gallery, a web-based\nphoto album written in PHP4. The Common Vulnerabilities and Exposures\nproject identifies the following vulnerabilities:\n\nCAN-2004-1106\n\n Jim Paris discovered a cross site scripting vulnerability which\n allows code to be inserted by using specially formed URLs.\n\nCVE-NOMATCH\n\n The upstream developers of gallery have fixed several cases of\n possible variable injection that could trick gallery to unintended\n actions, e.g. leaking database passwords.\n\nFor the stable distribution (woody) these problems have been fixed in\nversion 1.2.5-8woody3.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 1.4.4-pl4-1.\n\nWe recommend that you upgrade your gallery package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.0 alias woody\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5-8woody3.dsc\n Size/MD5 checksum: 573 f789c8198ba2b859cfb5cca31aaf6dcd\n http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5-8woody3.diff.gz\n Size/MD5 checksum: 7908 6acd9ee257ddad8c2ffa568b5540e9fe\n http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5.orig.tar.gz\n Size/MD5 checksum: 132099 1a32e57b36ca06d22475938e1e1b19f9\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/g/gallery/gallery_1.2.5-8woody3_all.deb\n Size/MD5 checksum: 133126 3527d050800873dc990c1d002478aa7e\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 2, "modified": "2005-01-17T00:00:00", "published": "2005-01-17T00:00:00", "id": "DEBIAN:DSA-642-1:B598A", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00020.html", "title": "[SECURITY] [DSA 642-1] New gallery packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}