Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 60742 - www-apps/gallery PHP Insertion
Summary: www-apps/gallery PHP Insertion
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
Whiteboard: C3? [glsa+] jaervosz
Depends on:
Reported: 2004-08-18 01:07 UTC by Sune Kloppenborg Jeppesen
Modified: 2011-10-30 22:41 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---

Diff to close the hole (save_photos.diff,461 bytes, patch)
2004-08-18 14:29 UTC, Stuart Herbert (RETIRED)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen gentoo-dev 2004-08-18 01:07:43 UTC
Gallery 1.4.4 save_photos.php PHP Insertion Proof of Concept 
         By aCiDBiTS 17-August-2004 

++ Vulnerability description ++ 

        Gallery ( is a PHP image gallery script. Having 
 permission to upload photos in some album and the temporal directory is in 
 the webtree, then it is possible to create a file with any extension and 
 content. Tested in v 1.4.4, maybe older versions also vulnerable. 

        When uploading photos with the "URL method", they are saved in the temporal 
 directory before processing them. Any file with any content is accepted. 
 After downloading, the file is processed (discarded if it is not an image) 
 and deleted from the temporal directory. 

        When the script downloads the file to the temporal directory there's the 
 function set_time_limit() that by default waits 30 seconds to abort the 
 process if no more data is recieved and the transfer connection isn't 
 closed. If the temporal directory is in the webtree, during this 30 seconds 
 timeout we can access to the file, executing it. 

        There's also a "directory disclosure" that I've used to determine if the 
 temporal directory is in gallery's webtree. It consists in sending a longer 
 filename than permited by the filesystem for the image upload name. 

++ How this Proof of Concept works ++ 

        1. You need to have a fake image script (like galfakeimg.php) in a web 
 accessible by gallery to download it. 
         2. The script searches for an Album with "everybody" permission to add 
         3. Checks if the temporal directory is in the webtree. 
         4. Tell gallery to download the fake_photo that contains the script. 
         5. After XEC_TIMEOUT seconds waiting, it executes the temp file and 
 test.php is created. 

        Usage (in my debian box): 
         php4 -q ./gal_poc.php "" 

        NOTE: If there are no albums with public permissions to add photos and you 
 have a valid login, modify the script adding your login cookie.
Comment 1 Sune Kloppenborg Jeppesen gentoo-dev 2004-08-18 01:11:07 UTC
web-apps please verify this and produce an updated ebuild if this is an issue.
Comment 2 Stuart Herbert (RETIRED) gentoo-dev 2004-08-18 14:27:36 UTC
It does look like gallery is vulnerable, although the posted proof-of-concept code doesn't run for me.

I've attached a patch which should close the problem.  Renat, could you put the webapp-based gallery ebuild into Portage, and include this patch in that?  That'd be great.

The exploit looks like it relies on the php.ini setting "allow_fopen_url" being set to "on".  Without that setting, I can't see how an unpatched gallery would be vulnerable to this exploit.

Best regards,
Comment 3 Stuart Herbert (RETIRED) gentoo-dev 2004-08-18 14:29:01 UTC
Created attachment 37695 [details, diff]
Diff to close the hole
Comment 4 Renat Lumpau (RETIRED) gentoo-dev 2004-08-18 23:36:45 UTC
gallery-1.4.4-r1.ebuild in CVS
Comment 5 Sune Kloppenborg Jeppesen gentoo-dev 2004-08-19 01:22:32 UTC
Thx Renat.

Arches please mark stable.
Comment 6 Pieter Van den Abeele (RETIRED) gentoo-dev 2004-08-19 11:51:32 UTC
stable on ppc
Comment 7 Jason Wever (RETIRED) gentoo-dev 2004-08-19 16:51:22 UTC
Stable on sparc
Comment 8 Bryan Østergaard (RETIRED) gentoo-dev 2004-08-19 19:17:34 UTC
Stable on alpha.
Comment 9 Mike Nerone 2004-08-20 16:56:55 UTC
The patch introduces a parsing error when trying to upload photos via the "Form" method. After browsing for the pic(s) and hitting "Upload Now," the error displayed is (server name editted out to protect the innocent):

Parse error: parse error, unexpected '{' in /var/www/SERVERNAME/htdocs/gallery/save_photos.php on line 134

Specifically, the third line added by the patch (the one that contained "!acceptableFormat") needs one more ")" at the end.

Comment 10 Sune Kloppenborg Jeppesen gentoo-dev 2004-08-20 22:51:38 UTC
Back to ebuild status. Stuart or Renat please fix this?
Comment 11 Matthias Geerdsen (RETIRED) gentoo-dev 2004-08-21 04:21:12 UTC
Gallery v1.4.4-pl1 has been released to adress the issue:
Comment 12 Mike Nerone 2004-08-21 09:25:11 UTC
I've posted a trivial patch to 1.4.4-pl1 at Bug #61164.
Comment 13 Renat Lumpau (RETIRED) gentoo-dev 2004-08-21 12:27:30 UTC
My dev box is down, and I don't know when it'll be back. Stuart, please do this if you have time.
Comment 14 Stuart Herbert (RETIRED) gentoo-dev 2004-08-23 12:37:20 UTC
stable on x86, and I've fixed the syntax error in the patch.
Comment 15 Mike Nerone 2004-08-23 15:42:30 UTC
I submit that since the ebuild was marked stable on some arches with the bad patch, the ebuild rev should be bumped. Myself, I'm already using gallery-1.4.4_p1 (Bug #61164), so it doesn't matter to me personally.
Comment 16 Sune Kloppenborg Jeppesen gentoo-dev 2004-08-24 11:36:11 UTC
Stuart please bump to r2 so users will pickup the correct version.
Comment 17 Sune Kloppenborg Jeppesen gentoo-dev 2004-08-26 09:45:28 UTC
web-apps please bump to -r2 the GLSA is ready.
Comment 18 Guy Martin (RETIRED) gentoo-dev 2004-08-27 02:59:14 UTC
Stable on hppa.
Comment 19 Martin Holzer (RETIRED) gentoo-dev 2004-08-27 09:54:12 UTC
p2 is now in cvs
Comment 20 Sune Kloppenborg Jeppesen gentoo-dev 2004-08-27 11:23:27 UTC
This one is ready for GLSA. Security please review the draft.
Comment 21 Sune Kloppenborg Jeppesen gentoo-dev 2004-09-01 06:20:08 UTC
web-apps please confirm or clarify our workaround:

Move the temporary directory out of the webroot. It is also advisable to disable upload rights to all albums to "EVERYBODY". Lastly this exploit does not effect users with "allow_fopen_url" set to "off" in php.ini. 

Also what is the defaults for these settings in a normal install?
Comment 22 Renat Lumpau (RETIRED) gentoo-dev 2004-09-02 09:29:09 UTC
From the gallery website: 
Am I vulnerable?
Chances are pretty good that you are not vulnerable to this security problem. The only way it can affect you is if:
Comment 23 Renat Lumpau (RETIRED) gentoo-dev 2004-09-02 09:29:09 UTC
From the gallery website: 
Am I vulnerable?
Chances are pretty good that you are not vulnerable to this security problem. The only way it can affect you is if:
the Attacker has upload rights to an album (either via EVERYBODY, or other rights)
your Gallery temp directory is located inside the webroot. (Unusual, but not that out of the ordinary)
URL wrappers are enabled
Gallery is in debug/devMode or PHP is set to always display error messages

By default:
- upload rights to a new album are off
- no temp gallery (the user has to explicitly specify it, and /tmp is given as an example)
- no idea about URL wrappers
- debug and dev mode are off, don't know about error messages
- also, ask Stu about allow_fopen_url in php.ini

Thus, workaround: 
- turn off upload rights to everybody
- move temp dir out of webroot
- turn off debug/dev mode
- set php to not always display error messages
- turn off allow_fopen_url in php.ini

Makes sense?
Comment 24 Sune Kloppenborg Jeppesen gentoo-dev 2004-09-02 13:45:53 UTC
GLSA 200409-05