Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 475816 (CVE-2013-2240) - www-apps/gallery: Two security flaws (CVE-2013-{2240,2241})
Summary: www-apps/gallery: Two security flaws (CVE-2013-{2240,2241})
Status: RESOLVED FIXED
Alias: CVE-2013-2240
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-07-05 10:53 UTC by Agostino Sarubbo
Modified: 2013-10-16 02:07 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-07-05 10:53:02 UTC
From ${URL} :


  Gallery upstream has released 3.0.9 version, correcting two security flaws:
  [1] http://galleryproject.org/gallery_3_0_9

My guess [***] is the two issues are as follows:

* Issue #1 - Improper stripping of URL fragments in flowplayer
SWF file might lead to reply attacks (a different flaw than CVE-2013-2138):
----------------------------------------------------------------------------

  A security flaw was found in the way flowplayer SWF file handling functionality
  of Gallery version 3, an open source project with the goal to develop and
  support leading photo sharing web application solutions, processed certain
  URL fragments passed to this file (certain URL fragments were not stripped
  properly when these files were called via direct URL request(s)). A remote
  attacker could use this flaw to conduct replay attacks.

  A different vulnerability than CVE-2013-2138.

  Upstream ticket:
  [2] http://sourceforge.net/apps/trac/gallery/ticket/2073

  Relevant upstream patch:
  [3] https://github.com/gallery/gallery3/commit/c5318bb1a2dd266b50317a2adb74d74338593733

  References:
  [4] https://bugzilla.redhat.com/show_bug.cgi?id=981197

* Issue #2 - gallery3: Multiple information exposure flaws in data rest core module
-----------------------------------------------------------------------------------

  Multiple information exposure flaws were found in the way data rest core module
  of Gallery version 3, an open source project with the goal to develop and support
  leading photo sharing web application solutions, used to previously restrict access
  to certain items of the photo album. A remote attacker, valid Gallery 3 user, could
  use this flaw to possibly obtain sensitive information (file, resize or thumb path
  of the item in question).

  Upstream ticket:
  [5] http://sourceforge.net/apps/trac/gallery/ticket/2074

  Relevant upstream patch (against 3.0.x branch):
  [6] https://github.com/gallery/gallery3/commit/cbbcf1b4791762d7da0ea7b6c4f4b551a4d9caed

  References:
  [7] https://bugzilla.redhat.com/show_bug.cgi?id=981198



@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Anthony Basile gentoo-dev 2013-07-06 13:05:56 UTC
(In reply to Agostino Sarubbo from comment #0)
> @maintainer(s): after the bump, in case we need to stabilize the package,
> please say explicitly if it is ready for the stabilization or not.

Already done and the vulnerable versions are off the tree.  Note this does not affect 2.3.2.

No need for stabilization.
Comment 2 Chris Reffett (RETIRED) gentoo-dev Security 2013-07-07 01:37:08 UTC
Nothing to do here, then.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2013-10-16 02:07:34 UTC
CVE-2013-2241 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2241):
  modules/gallery/helpers/data_rest.php in Gallery 3 before 3.0.9 allows
  remote attackers to bypass intended access restrictions and obtain sensitive
  information (image files) via the "full" string in the size parameter.

CVE-2013-2240 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2240):
  lib/flowplayer.swf.php in Gallery 3 before 3.0.9 does not properly remove
  query fragments, which allows remote attackers to have an unspecified impact
  via a replay attack, a different vulnerability than CVE-2013-2138.