Multiple information exposure flaws were found in the way data rest core module of Gallery version 3, an open source project with the goal to develop and support leading photo sharing web application solutions, used to previously restrict access to certain items of the photo album. A remote attacker, valid Gallery 3 user, could use this flaw to possibly obtain sensitive information (file, resize or thumb path of the item in question).
Relevant upstream patch (against 3.0.x branch):
This issue affects the versions of the gallery3 package, as shipped with Fedora release of 17, 18, and 19. Please schedule an update.
This issue affects the versions of the gallery3 package, as shipped with Fedora EPEL-6. Please schedule an update.
Created gallery3 tracking bugs for this issue:
Affects: fedora-all [bug 981218]
Affects: epel-6 [bug 981219]
Further CVE-2013-2241 issue details clarification from Shad Laws of Gallery 3 upstream (http://www.openwall.com/lists/oss-security/2013/07/05/3):
A quick clarification on issue #2: the problem wasn't the item information
or paths, but rather the original-sized image file.
A legitimate user with "view" privileges for an item should be able to:
- get the item info and image file links (e.g.
- follow the links and get the "thumb" and "resize" image files themselves.
- guess the "full" image file link without thinking too hard (e.g.
- follow the link and get the "full" image file itself **ONLY** if they
have "view_full" access.
The problem was that this last condition wasn't being properly enforced.