Gallery Authentication Bypass...

- AV AC AU C I A
发布: 2004-06-02
修订: 2025-04-13

It has been disclosed that an attacker can bypass Gallery's authentication process, and log in as any user without a password. An attacker can override configuration variables by passing them in GET, POST or cookie arguments. Gallery simulates the 'register_globals' PHP setting by extracting the values of the various $HTTP_ global variables into the global namespace. Therefore, regardless of the 'register_globals' PHP setting, an attacker can override configuration variables. An attacker can change configuration variables and cause Gallery to skip the authentication steps. Versions prior to 1.4.3-pl2 are reported to be vulnerable.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息