A security flaw was found in the way uploadify and flowplayer SWF files handling functionality of Gallery version 3, an open source project with the goal to develop and support leading photo sharing web application solutions, processed certain URL fragments passed to these files (certain URL fragments were not stripped properly when these files were called via direct URL request(s)). A remote attacker could use this flaw to conduct replay attacks. References: [1] http://sourceforge.net/mailarchive/message.php?msg_id=30925931 [2] http://galleryproject.org/gallery_3_0_8 Relevant upstream tickets (and patches): * uploadify case: [3] http://sourceforge.net/apps/trac/gallery/ticket/2068 [4] https://github.com/gallery/gallery3/commit/80bb0f2222dd99ed2ce59e804b833bab63cc376a * flowplayer case: [5] http://sourceforge.net/apps/trac/gallery/ticket/2070 [6] https://github.com/gallery/gallery3/commit/3e5bba2cd4febe8331c0158c11ea418f21c72efa [7] https://github.com/gallery/gallery3/commit/12e51694fdc39c752cc439424cf309866f9f914a
These issues affect the versions of the gallery3 package, as shipped with Fedora release of 17, 18, and Fedora EPEL-6. Please schedule an update.
Created gallery3 tracking bugs for this issue Affects: fedora-all [bug 970598] Affects: epel-6 [bug 970599]
CVE Request: http://www.openwall.com/lists/oss-security/2013/06/04/1
The CVE identifier of CVE-2013-2138 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2013/06/04/9