Lucene search

K
freebsdFreeBSDEDD201A5-8FC3-11E2-B131-000C299B62E1
HistoryFeb 06, 2013 - 12:00 a.m.

piwigo -- CSRF/Path Traversal

2013-02-0600:00:00
vuxml.freebsd.org
14

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.721 High

EPSS

Percentile

98.0%

High-Tech Bridge Security Research Lab reports:

The CSRF vulnerability exists due to insufficient verification of the
HTTP request origin in “/admin.php” script. A remote attacker can trick
a logged-in administrator to visit a specially crafted webpage and
create arbitrary PHP file on the remote server.
The path traversal vulnerability exists due to insufficient filtration
of user-supplied input in “dl” HTTP GET parameter passed to
“/install.php” script. The script is present on the system after
installation by default, and can be accessed by attacker without any
restrictions.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchpiwigo< 2.4.7UNKNOWN

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.721 High

EPSS

Percentile

98.0%