download.php in McGallery 0.5b allows remote attackers to read arbitrary files and obtain script source code via the filename parameter.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/1003 | vdb entry |
https://www.exploit-db.com/exploits/3494 | exploit |
http://www.securityfocus.com/bid/22989 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33004 | vdb entry |