Bug 962437 (CVE-2013-2087) - CVE-2013-2087 gallery3: Two XSS flaws fixed in upstream 3.0.7 version
Summary: CVE-2013-2087 gallery3: Two XSS flaws fixed in upstream 3.0.7 version
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-2087
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
: 962439 (view as bug list)
Depends On: 962440 962441
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-05-13 13:44 UTC by Jan Lieskovsky
Modified: 2021-10-20 10:38 UTC (History)
1 user (show)

Fixed In Version: Gallery-3.0.7
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-20 10:38:18 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2013-05-13 13:44:04 UTC
Two cross-site scripting (XSS) flaws were corrected in Gallery 3.0.7 version:
-----------------------------------------------------------------------------

A) XSS by generating error messages due improper escaping of certain element values: 

A cross-site scripting (XSS) flaw was found in the way Gallery, an open source project with the goal to develop and support leading photo sharing web application solutions, performed sanitization of certain argument values when generating error messages. A remote attacker could provide a specially-crafted web page that, when visited by the Gallery user with the administrator privilege, would lead to arbitrary HTML or web script execution in the context of particular Gallery user's session.

References:
[1] http://www.openwall.com/lists/oss-security/2013/05/13/2
[2] http://galleryproject.org/gallery_3_0_7

Relevant upstream patch:
[3] https://github.com/gallery/gallery3/commit/c37288f0b24c19813405096c087ab0c7c171c358

--

B) XSS in Movie controller due improper sanitization of (certain) movie title(s) when saving movies:

A cross-site scripting (XSS) flaw was found in the way Movie controller of Gallery, an open source project with the goal to develop and support leading photo sharing web application solutions, performed sanitization of certain movie title arguments, when saving movies. A remote attacker could provide a specially-crafted web page that, when visited by valid Gallery user, would lead to arbitrary HTML or web script execution in the context of particular Gallery user's session.

References:
[4] http://www.openwall.com/lists/oss-security/2013/05/13/2
[5] http://galleryproject.org/gallery_3_0_7

Relevant upstream patch:
[6] https://github.com/gallery/gallery3/commit/0f28d4cee460dfada48bd6c81470db62e48b16d0

Comment 1 Jan Lieskovsky 2013-05-13 13:52:47 UTC
This issue affects the versions of the gallery3 package, as shipped with Fedora release of 17, 18, and Fedora EPEL-6. Please schedule an update.

Comment 2 Jan Lieskovsky 2013-05-13 13:54:11 UTC
Created gallery3 tracking bugs for this issue

Affects: fedora-all [bug 962440]
Affects: epel-6 [bug 962441]

Comment 3 Jan Lieskovsky 2013-05-13 14:02:23 UTC
This issue did NOT affect the versions of the gallery2 package, as shipped with Fedora release of 17, 18, and Fedora EPEL-5, as they did NOT contain the vulnerable code part / functionality yet.

Comment 4 Jan Lieskovsky 2013-05-14 08:54:48 UTC
One CVE identifier of CVE-2013-2087 has been assigned:
  http://www.openwall.com/lists/oss-security/2013/05/14/1

for both of the issues:
* XSS by generating error messages due improper escaping of certain element values
* XSS in Movie controller due improper sanitization of (certain) movie title(s) when saving movies

Comment 5 Jan Lieskovsky 2013-05-14 08:55:34 UTC
*** Bug 962439 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.