Description
Directory traversal vulnerability in gallery.php in XeroXer Simple one-file gallery allows remote attackers to read arbitrary files via a .. (dot dot) in the f parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by laurent gaffie · textwebappsphp
https://www.exploit-db.com/exploits/29642
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/461080/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/32654
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22700
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2292
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/33760
Scores
EPSS
0.0460
EPSS Percentile
89.3%
Details
Status
published
Products (1)
xeroxer/simple_one-file_gallery
< 0.6
Published
Feb 27, 2007
Tracked Since
Feb 18, 2026