Description
|
|
Multiple vulnerabilities were identified in Gallery, which could be exploited by attackers to gain knowledge of sensitive information or conduct directory traversal and cross site scripting attacks.
The first flaw is due to an input validation error in the "Add Image From Web" feature when processing javascript code embedded in <img> tags, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The second issue is due to an input validation error in the "zipcart" module (not enabled by default) that does not properly filter certain parameters, which may be exploited by remote attackers to retrieve arbitrary files from a vulnerable system via directory traversal attacks.
The third vulnerability is due to a design error where the installation log is created and stored in the webroot directory, which could be exploited by remote attackers to disclose sensitive information.
|