Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 411727 (CVE-2012-1113) - <www-apps/gallery-2.3.2: multiple Vulnerabilities (CVE-2012-1113)
Summary: <www-apps/gallery-2.3.2: multiple Vulnerabilities (CVE-2012-1113)
Status: RESOLVED FIXED
Alias: CVE-2012-1113
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor with 1 vote (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/48767/
Whiteboard: B4 [noglsa]
Keywords:
Depends on: 421761
Blocks:
  Show dependency tree
 
Reported: 2012-04-12 12:42 UTC by Agostino Sarubbo
Modified: 2013-12-11 01:35 UTC (History)
7 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
gallery-3.0.3.ebuild (gallery-3.0.3.ebuild,1.34 KB, application/octet-stream)
2012-04-12 13:36 UTC, Daniel Heule
no flags Details
files/postinstall-en.txt (postinstall-en.txt,581 bytes, text/plain)
2012-04-12 13:37 UTC, Daniel Heule
no flags Details
gallery-3.0.3.ebuild (gallery-3.0.3.ebuild,1.37 KB, text/plain)
2012-04-24 08:40 UTC, Daniel Heule
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2012-04-12 12:42:19 UTC
From secunia security advisory at $URL:


Description:
Multiple vulnerabilities have been reported in Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks.

Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerabilities are reported in versions prior to 2.3.2 and 3.0.3.


Solution
Update to version 2.3.2 or 3.0.3.


CC Daniel because he expressed his interest in proxy-maintain it.
Comment 1 Daniel Heule 2012-04-12 13:36:28 UTC
Created attachment 308653 [details]
gallery-3.0.3.ebuild

updated Gallery 3.0.3 ebuild
Comment 2 Daniel Heule 2012-04-12 13:37:24 UTC
Created attachment 308655 [details]
files/postinstall-en.txt

files/postinstall-en.txt --> to proper display informations when webapp-config runs ...
Comment 3 Daniel Heule 2012-04-12 13:39:13 UTC
Atention for all who are using the clean-canvas theme (optional addon). In 3.0.3 clean canvas has some problems, a update doesn't exist at the moment ...
Comment 4 Daniel Heule 2012-04-12 13:49:01 UTC
Update via webapp-config from 3.0.2 to 3.0.3 tested, no problems with standard gallery modules so far ...
Comment 5 Sander Siemonsma 2012-04-18 12:45:50 UTC
Update went ok from 3.0.2 to 3.0.3. Can ffmpeg be added as use flag? Movies are relying on this.
Comment 6 Daniel Heule 2012-04-24 08:40:32 UTC
Created attachment 309905 [details]
gallery-3.0.3.ebuild

gallery ebuild with ffmpeg useflag.

Question: is it correct to relay on virtual/ffmpeg ?
Comment 7 Sander Siemonsma 2012-04-24 13:03:55 UTC
(In reply to comment #6)
> Created attachment 309905 [details]
> gallery-3.0.3.ebuild
> 
> gallery ebuild with ffmpeg useflag.
> 
> Question: is it correct to relay on virtual/ffmpeg ?

Not sure about this. I've got media-video/ffmpeg installed, but am not sure about the difference with the virtual/ffmpeg package.
Comment 8 Daniel Heule 2012-07-01 11:45:42 UTC
Bug 421761 (Gallery 3.0.4) has obsolteted this bug ....

hmmm ... bringing a updated ebuild to the portage tree takes more time than develop a new gallery version ... ;-)

@Gentoo Dev's: please look at bug 421761 and push the new version to the tree,
and mark this bug as obsolet ...
Comment 9 coran.fisher@gmail.com 2013-01-15 18:23:02 UTC
might be good to at least do a bump of gallery to address this very long standing security issue.  Even just 2.3.2 would be a start.
Comment 10 Agostino Sarubbo gentoo-dev 2013-02-26 13:27:06 UTC
From https://secunia.com/advisories/52349/ :

Description
A security issue and multiple vulnerabilities have been reported in Gallery, which can be exploited by malicious people to disclose certain potentially sensitive information and conduct spoofing, cross-site scripting, and clickjacking attacks.

1) An unspecified error when viewing the login page can be exploited to disclose tag names.

2) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. delete users, modify user privileges, or delete an album by tricking a user or an administrative user into clicking a specially crafted link via clickjacking.

3) Certain input related to flowplayer is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.

4) An unspecified error in the password reset functionality can be exploited to conduct spoofing attacks.

The vulnerabilities are reported in versions prior to 3.0.5.


Solution
Update to version 3.0.5.
Comment 11 Daniel Heule 2013-03-12 16:22:37 UTC
Please see the new 3.0.5 ebuild at bug 421761
Comment 12 Anthony Basile gentoo-dev 2013-03-13 01:48:02 UTC
(In reply to comment #11)
> Please see the new 3.0.5 ebuild at bug 421761

Look at my comments about the ebuild.  Let's try to get it on the tree in the next few days.
Comment 13 Anthony Basile gentoo-dev 2013-03-14 02:29:17 UTC
gallery-3.0.5 added to the tree.
Comment 14 Sean Amoss (RETIRED) gentoo-dev Security 2013-03-14 12:51:07 UTC
(In reply to comment #13)
> gallery-3.0.5 added to the tree.

Anthony, =www-apps/gallery-3.0.5 is ready for stabilization?
Comment 15 Anthony Basile gentoo-dev 2013-03-25 13:18:01 UTC
(In reply to comment #14)
> (In reply to comment #13)
> > gallery-3.0.5 added to the tree.
> 
> Anthony, =www-apps/gallery-3.0.5 is ready for stabilization?

Yes go ahead and stabilize 3.0.5. KEYWORDS="~amd64 ~x86"

I just realized that this bug also affects 2.3.1 which is in the tree, so I bumped that ebuild to 2.3.2.  I'm not sure its ready to stablize yet.

Also Daniel will keep an eye on these ebuilds.  I'll proxy for him.
Comment 16 Sean Amoss (RETIRED) gentoo-dev Security 2013-03-26 00:34:08 UTC
(In reply to comment #15)

> 
> I just realized that this bug also affects 2.3.1 which is in the tree, so I
> bumped that ebuild to 2.3.2.  I'm not sure its ready to stablize yet.
> 

Security stabilizing a different major version is not ideal - it just seemed like that was the only option since no one was bumping 2.3.x. :)

We can wait until 2.3.2 is ready and stabilize that.
Comment 17 Agostino Sarubbo gentoo-dev 2013-04-25 08:14:06 UTC
https://secunia.com/advisories/53149/ :

Description
A vulnerability has been reported in Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed via key value pairs is not properly sanitised before being returned to the user on an error page. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability is reported in versions prior to 3.0.7.


Solution
Update to version 3.0.7.

Provided and/or discovered by
The vendor credits Dhiraj Ranka.

Original Advisory
http://galleryproject.org/gallery_3_0_7
Comment 18 Daniel Heule 2013-04-26 06:43:45 UTC
Tested the new ebuild 3.0.7 which is in the tree.

For me, it works pefekt ... thank you...
Comment 19 Agostino Sarubbo gentoo-dev 2013-05-16 11:28:52 UTC
http://www.openwall.com/lists/oss-security/2013/05/13/2

Please check if the 2.x is affected as well.
Comment 20 Agostino Sarubbo gentoo-dev 2013-05-16 11:31:03 UTC
(In reply to comment #19)
> http://www.openwall.com/lists/oss-security/2013/05/13/2
> 
> Please check if the 2.x is affected as well.

err, this is not needed.

Arches, please test and mark stable:
=www-apps/gallery-3.0.7
Target keywords : "amd64 hppa ppc ppc64 x86"
Comment 21 Anthony Basile gentoo-dev 2013-05-16 11:37:26 UTC
(In reply to comment #20)
> (In reply to comment #19)
> > http://www.openwall.com/lists/oss-security/2013/05/13/2
> > 
> > Please check if the 2.x is affected as well.
> 
> err, this is not needed.
> 
> Arches, please test and mark stable:
> =www-apps/gallery-3.0.7
> Target keywords : "amd64 hppa ppc ppc64 x86"

We should also stabilize =www-apps/gallery-2.3.2 since we should remove 2.3.1 from the tree.
Comment 22 Agostino Sarubbo gentoo-dev 2013-05-16 11:48:56 UTC
(In reply to comment #21)
> We should also stabilize =www-apps/gallery-2.3.2 since we should remove
> 2.3.1 from the tree.

The upstream site says that the series 2 was replaced by the 3. Is strictly needed stabilize the 2.x* ?
I'd prefer to stabilize the 3.0.7 version and drop the other
Comment 23 Jeroen Roovers (RETIRED) gentoo-dev 2013-05-16 15:40:57 UTC
I have just restored the missing ~arch in the 3.* ebuilds. No idea why they were removed.
Comment 24 Anthony Basile gentoo-dev 2013-05-16 16:14:43 UTC
(In reply to comment #22)
> (In reply to comment #21)
> > We should also stabilize =www-apps/gallery-2.3.2 since we should remove
> > 2.3.1 from the tree.
> 
> The upstream site says that the series 2 was replaced by the 3. Is strictly
> needed stabilize the 2.x* ?
> I'd prefer to stabilize the 3.0.7 version and drop the other

gallery-2 to 3 is a nasty upgrade.
Comment 25 Agostino Sarubbo gentoo-dev 2013-05-17 09:09:22 UTC
(In reply to comment #24)
> gallery-2 to 3 is a nasty upgrade.

The vulnerability in comment 17 affects the 2.x series?
Comment 26 Anthony Basile gentoo-dev 2013-05-17 09:58:45 UTC
(In reply to comment #25)
> (In reply to comment #24)
> > gallery-2 to 3 is a nasty upgrade.
> 
> The vulnerability in comment 17 affects the 2.x series?

They are still distributing the 2.x series.  They have 2.3.2 on their download page:

    http://codex.galleryproject.org/Downloads

I assume they are backporting the fixes to 2.x.
Comment 27 Agostino Sarubbo gentoo-dev 2013-05-17 10:02:49 UTC
(In reply to comment #26)
> (In reply to comment #25)
> > (In reply to comment #24)
> > > gallery-2 to 3 is a nasty upgrade.
> > 
> > The vulnerability in comment 17 affects the 2.x series?
> 
> They are still distributing the 2.x series.  They have 2.3.2 on their
> download page:
> 
>     http://codex.galleryproject.org/Downloads
> 
> I assume they are backporting the fixes to 2.x.

ok.

Arches, please test and mark stable:
=www-apps/gallery-2.3.2
Target keywords : "amd64 hppa ppc ppc64 x86"
Comment 28 Agostino Sarubbo gentoo-dev 2013-05-17 10:05:51 UTC
amd64 stable
Comment 29 Agostino Sarubbo gentoo-dev 2013-05-17 10:06:44 UTC
x86 stable
Comment 30 Agostino Sarubbo gentoo-dev 2013-05-17 10:07:20 UTC
ppc stable
Comment 31 Agostino Sarubbo gentoo-dev 2013-05-17 10:07:30 UTC
ppc64 stable
Comment 32 Agostino Sarubbo gentoo-dev 2013-05-17 10:14:16 UTC
hppa stable
Comment 33 Agostino Sarubbo gentoo-dev 2013-05-17 10:16:23 UTC
Old removed, please vote
Comment 34 Sergey Popov gentoo-dev 2013-08-22 09:54:34 UTC
Multiple vulnerabilities, but according to CVE - XS only

GLSA vote: no
Comment 35 Chris Reffett (RETIRED) gentoo-dev Security 2013-12-11 01:35:59 UTC
GLSA vote: no. Closing noglsa.