Directory traversal vulnerability in the session handling class (GallerySession.class) in Gallery 2 up to 2.0.2 allows remote attackers to access and delete files by specifying the session in a cookie, which is used in constructing file paths before the session value is sanitized.
2006-03-09T22:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 6.4 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:P/A:N
10.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gallery_project | gallery | 2.0 | Yes |
Application | gallery_project | gallery | 2.0.1 | Yes |
Application | gallery_project | gallery | 2.0.2 | Yes |
Application | gallery_project | gallery | 2.0_alpha | Yes |
Application | gallery_project | gallery | 2.0_alpha1 | Yes |
Application | gallery_project | gallery | 2.0_alpha2 | Yes |
Application | gallery_project | gallery | 2.0_alpha3 | Yes |
Application | gallery_project | gallery | 2.0_alpha4 | Yes |
Application | gallery_project | gallery | 2.0_beta1 | Yes |
Application | gallery_project | gallery | 2.0_beta2 | Yes |
Application | gallery_project | gallery | 2.0_beta3 | Yes |