Package: gallery2
Severity: grave
Tags: security

A new version has been released which fixes the following bugs:

*   Arbitrary file disclosure through archive upload module - Users with "add 
item" permission could retrieve any file on the server that is owned by the 
web server account. The problem is caused by incorrect handling of ZIP 
archives that contain symbolic links.
The Gallery team would like to thank Alex Ustinov for bringing this issue to 
our attention.
* Insecure cookies over HTTPS - When accessing Gallery over HTTPS, cookies 
were missing the "secure" flag, leaving the connection vulnerable to cookie 
sniffing attacks.
The Gallery team would like to thank Hanno Boeck for bringing this issue to 
our attention.
* XSS through malicious Flash files - Flash animations that are embedded in 
Gallery are no longer allowed to interact with the embedding page and are no 
longer allowed to open network connections.
While this protects visitors of your Gallery from potentially malicious Flash 
animations, the Gallery team would like to use this opportunity to remind you 
that it is generally highly recommended to only allow trusted users to add any 
files to your Gallery.

For more informations, see http://gallery.menalto.com/gallery_2.2.6_released

Thanks and with kind regards, Jan.
-- 
Never write mail to <[EMAIL PROTECTED]>, you have been warned!
-----BEGIN GEEK CODE BLOCK-----
Version: 3.1
GIT d-- s+: a- C+++ UL++++ P+ L+++ E- W+++ N+++ o++ K++ w--- O M V- PS PE
Y++ PGP++ t-- 5 X R tv- b+ DI- D++ G++ e++ h-- r+++ y+++
------END GEEK CODE BLOCK------

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to