Welcome to Geeklog, Anonymous Monday, January 13 2025 @ 10:24 pm EST
Geeklog Forums
Geeklog / Gallery vulnerability
Jason
Anonymous
As detailed in this article,
http://www.securityfocus.com/guest/24043
Geeklog and/or Gallery can be used to compomise a host. I personally used my own server to test the problem. I was able to write arbitrary data to /tmp, cat the /etc/passwd file, and do anything the "nobody" or "www" user could do on a host.
Maybe this has been addressed in a recent release of Geeklog or Gallery integration, but I'm running geeklog-1.3.8-1sr2 and Gallery integration gallery_1.3.4-pl1_1.3.8.tar.gz. I think those are recent.
It's possible this is just a problem in the Gallery integration (that's where I tested it) but I would imagine any improperly set variable like this (variables used in an include) could cause the same problem.
Thought I should bring it up, in case it hasn't been pointed out or discussed.
http://www.securityfocus.com/guest/24043
Geeklog and/or Gallery can be used to compomise a host. I personally used my own server to test the problem. I was able to write arbitrary data to /tmp, cat the /etc/passwd file, and do anything the "nobody" or "www" user could do on a host.
Maybe this has been addressed in a recent release of Geeklog or Gallery integration, but I'm running geeklog-1.3.8-1sr2 and Gallery integration gallery_1.3.4-pl1_1.3.8.tar.gz. I think those are recent.
It's possible this is just a problem in the Gallery integration (that's where I tested it) but I would imagine any improperly set variable like this (variables used in an include) could cause the same problem.
Thought I should bring it up, in case it hasn't been pointed out or discussed.
23
26
Quote
All times are EST. The time is now 10:24 pm.
- Normal Topic
- Sticky Topic
- Locked Topic
- New Post
- Sticky Topic W/ New Post
- Locked Topic W/ New Post
- View Anonymous Posts
- Able to post
- Filtered HTML Allowed
- Censored Content