Package: gallery2
Severity: grave
Tags: security
A new version has been released which fixes the following bugs:
* Arbitrary file disclosure through archive upload module - Users with "add
item" permission could retrieve any file on the server that is owned by the
web server account. The problem is caused by incorrect handling of ZIP
archives that contain symbolic links.
The Gallery team would like to thank Alex Ustinov for bringing this issue to
our attention.
* Insecure cookies over HTTPS - When accessing Gallery over HTTPS, cookies
were missing the "secure" flag, leaving the connection vulnerable to cookie
sniffing attacks.
The Gallery team would like to thank Hanno Boeck for bringing this issue to
our attention.
* XSS through malicious Flash files - Flash animations that are embedded in
Gallery are no longer allowed to interact with the embedding page and are no
longer allowed to open network connections.
While this protects visitors of your Gallery from potentially malicious Flash
animations, the Gallery team would like to use this opportunity to remind you
that it is generally highly recommended to only allow trusted users to add any
files to your Gallery.
For more informations, see http://gallery.menalto.com/gallery_2.2.6_released
Thanks and with kind regards, Jan.
--
Never write mail to <[EMAIL PROTECTED]>, you have been warned!
-BEGIN GEEK CODE BLOCK-
Version: 3.1
GIT d-- s+: a- C+++ UL P+ L+++ E- W+++ N+++ o++ K++ w--- O M V- PS PE
Y++ PGP++ t-- 5 X R tv- b+ DI- D++ G++ e++ h-- r+++ y+++
--END GEEK CODE BLOCK--
signature.asc
Description: This is a digitally signed message part.