Description
Directory traversal vulnerability in index.php in Scry Gallery 1.1 allows remote attackers to read arbitrary files via ".." sequences in the p parameter, which is not properly sanitized due to an rtrim function call with the arguments in the wrong order.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Morocco Security Team · textwebappsphp
https://www.exploit-db.com/exploits/27724
References (10)
Core 10
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17649
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17668
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1490
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/24889
Exploit x_refsource_misc
http://downloads.securityfocus.com/vulnerabilities/exploits/17649-directory-traversal.exploit
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/784
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25991
Various Sources mailing-list
x_refsource_vim
http://attrition.org/pipermail/vim/2006-April/000716.html
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/431716/100/0/threaded
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19777
Scores
EPSS
0.0949
EPSS Percentile
92.9%
Details
Status
published
Products (1)
scry_gallery/scry_gallery
1.1
Published
Apr 25, 2006
Tracked Since
Feb 18, 2026