Menalto Gallery before 2.2.4 does not properly check for malicious file extensions during file uploads, which allows attackers to execute arbitrary code via the (1) Core application or (2) MIME module.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://gallery.menalto.com/gallery_2.2.4_released | patch |
http://security.gentoo.org/glsa/glsa-200802-04.xml | vendor advisory |
http://osvdb.org/41669 | vdb entry |
http://secunia.com/advisories/28898 | third party advisory |
http://bugs.gentoo.org/show_bug.cgi?id=203217 |