We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-53276

GHSL-2024-092: Open CORS policy in home-gallery



Description

Home-Gallery.org is a self-hosted open-source web gallery to browse personal photos and videos. In 1.15.0 and earlier, an open CORS policy in app.js may allow an attacker to view the images of home-gallery when it is using the default settings. The following express middleware allows any website to make a cross site request to home-gallery, thus allowing them to read any endpoint on home-gallery. Home-gallery is mostly safe from cross-site requests due to most of its pages requiring JavaScript, and cross-site requests such as fetch() do not render javascript. If an attacker is able to get the path of the preview images which are randomized, an attacker will be able to view such a photo. If any static files or endpoints are introduced in the future that contain sensitive information, they will be accessible to an attacker website.

Reserved 2024-11-19 | Published 2024-12-23 | Updated 2024-12-24 | Assigner GitHub_M


MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-942: Permissive Cross-domain Policy with Untrusted Domains

Product status

<= 1.15.0
affected

References

securitylab.github.com/...24-091_GHSL-2024-092_home-gallery/

github.com/...allery/blob/v1.15.0/packages/server/src/app.js

cve.org (CVE-2024-53276)

nvd.nist.gov (CVE-2024-53276)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-53276

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.