aCiDBiTS has reported a vulnerability in Gallery, potentially allowing malicious people to compromise a vulnerable system.
The problem is that "save_photos.php" stores uploaded files in a temporary folder before processing them without checking if they are valid images files. This allows malicious people to upload and execute arbitrary code if the temporary folder is accessible from remote.
This has been reported to affect version 1.4.4. Prior versions may also be affected.
NOTE: This only affects systems where the temporary upload folder has been placed in a non-default and public accessible folder. Temporary folders should never be publicly accessible. It is also required that malicious people or users have upload privileges to an album.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org