Arbitrary Command Injection Affecting files.photo.gallery package, versions >=0.3.0 <0.10.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-FILESPHOTOGALLERY-8685108
  • published2 Feb 2025
  • disclosed31 Jan 2025
  • creditUnknown

Introduced: 31 Jan 2025

NewCVE-2024-53615  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade files.photo.gallery to version 0.10.0 or higher.

Overview

files.photo.gallery is a Single-file PHP file gallery and file manager / https://demo.files.gallery/

Affected versions of this package are vulnerable to Arbitrary Command Injection through the video thumbnail rendering component. If allow_upload and exec are enabled in config.php, and ffmpeg is in the PATH, a user can upload a malicious video file which will be executed upon rendering.

References

CVSS Scores

version 4.0
version 3.1