Bug 981198 (CVE-2013-2241)

Summary: CVE-2013-2241 gallery3: Multiple information exposure flaws in data rest core module
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: gwync
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-07-16 06:11:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 981218, 981219    
Bug Blocks:    

Description Jan Lieskovsky 2013-07-04 09:06:03 UTC
Multiple information exposure flaws were found in the way data rest core module of Gallery version 3, an open source project with the goal to develop and support leading photo sharing web application solutions, used to previously restrict access to certain items of the photo album. A remote attacker, valid Gallery 3 user, could use this flaw to possibly obtain sensitive information (file, resize or thumb path of the item in question).

References:
[1] http://galleryproject.org/gallery_3_0_9

Upstream ticket:
[2] http://sourceforge.net/apps/trac/gallery/ticket/2074

Relevant upstream patch (against 3.0.x branch):
[3] https://github.com/gallery/gallery3/commit/cbbcf1b4791762d7da0ea7b6c4f4b551a4d9caed

Comment 1 Jan Lieskovsky 2013-07-04 09:21:28 UTC
This issue affects the versions of the gallery3 package, as shipped with Fedora release of 17, 18, and 19. Please schedule an update.

--

This issue affects the versions of the gallery3 package, as shipped with Fedora EPEL-6. Please schedule an update.

Comment 2 Jan Lieskovsky 2013-07-04 09:22:29 UTC
CVE Request:
  http://www.openwall.com/lists/oss-security/2013/07/04/7

Comment 3 Jan Lieskovsky 2013-07-04 09:24:46 UTC
Created gallery3 tracking bugs for this issue:

Affects: fedora-all [bug 981218]
Affects: epel-6 [bug 981219]

Comment 4 Jan Lieskovsky 2013-07-08 15:24:00 UTC
Further CVE-2013-2241 issue details clarification from Shad Laws of Gallery 3 upstream (http://www.openwall.com/lists/oss-security/2013/07/05/3):

A quick clarification on issue #2: the problem wasn't the item information
or paths, but rather the original-sized image file.

A legitimate user with "view" privileges for an item should be able to:
- get the item info and image file links (e.g.
".../rest/data/123?size=thumb", etc.)
- follow the links and get the "thumb" and "resize" image files themselves.
- guess the "full" image file link without thinking too hard (e.g.
".../rest/data/123?size=full")
- follow the link and get the "full" image file itself **ONLY** if they
have "view_full" access.

The problem was that this last condition wasn't being properly enforced.