Description
|
|
Multiple vulnerabilities have been identified in Gallery, which could be exploited by attackers to execute arbitrary scripting code or manipulate arbitrary files.
The first issue is due to an input validation error in the "getRemoteHostAddress()" function that does not properly validate the "HTTP_X_FORWARDED_FOR" header, which could be exploited by attackers to spoof logged IP addresses or cause malicious scripting code to be executed by the user's browser in the security context of an affected Web site.
The second flaw is due to an input validation error in the "_isSessionValid()" function that does properly validate the "sessionId" variable before being passed to an "unlink()" call, which could be exploited by remote attackers to delete arbitrary files with the privileges of the web server.
|