Package: gallery2
Version: 2.2.5
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for smarty.

CVE-2007-2326[0]:
| Multiple PHP remote file inclusion vulnerabilities in HYIP Manager Pro
| allow remote attackers to execute arbitrary PHP code via a URL in the
| plugin_file parameter to (1) Smarty.class.php and (2)
| Smarty_Compiler.class.php in inc/libs/; (3)
| core.display_debug_console.php, (4) core.load_plugins.php, (5)
| core.load_resource_plugin.php, (6) core.process_cached_inserts.php,
| (7) core.process_compiled_include.php, and (8)
| core.read_cache_file.php in inc/libs/core/; and other unspecified
| files.  NOTE: (1) and (2) might be incorrectly reported vectors in
| Smarty.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2326
    http://security-tracker.debian.net/tracker/CVE-2007-2326

The vulnerable function is _get_plugin_filepath($type, $name).
You can find its definition in Smarty.class.php:

] function _get_plugin_filepath($type, $name)
] {
]       $_params = array('type' => $type, 'name' => $name);
]       require_once(SMARTY_CORE_DIR.'core.assemble_plugin_filepath.php');
]       return smarty_core_assemble_plugin_filepath($_params,$this);
] }

The $_params which contains the unchecked $type and $name of the
plugin which shall be inserted is not checked against RFI or other
malicious strings got via a GET requests.

Kind regards,
Thomas.

Attachment: signature.asc
Description: Digital signature

Reply via email to