vendor:
Piwigo
by:
High-Tech Bridge SA Security Research Lab
6,4
CVSS
MEDIUM
Directory Path Traversal, Cross-Site Scripting (XSS)
22, 79
CWE
Product Name: Piwigo
Affected Version From: 2.3.3
Affected Version To: 2.3.3
Patch Exists: YES
Related CWE: CVE-2012-2208, CVE-2012-2209
CPE: a:piwigo_project:piwigo
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2012
Directory Path Traversal and Cross-Site Scripting (XSS) in Piwigo
Input passed via the 'language' GET parameter to upgrade.php is vulnerable to directory path traversal. The directory path passed to the 'language' parameter is later used in include() function to include the following files: common.lang.php, admin.lang.php, install.lang.php and upgrade.lang.php. Under certain conditions this can be exploited to include malicious PHP file and execute arbitrary PHP code. Input passed via the 'section' GET parameter to admin.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in administrator's browser session in context of affected web site.
Mitigation:
Upgrade to the latest version of Piwigo