SQL injection vulnerability in the administrative backend in Piwigo before 2.7.4 allows remote administrators to execute arbitrary SQL commands via the user parameter in the history page to admin.php.
References
Link | Resource |
---|---|
http://piwigo.org/releases/2.7.4 | Patch Release Notes Vendor Advisory |
http://sroesemann.blogspot.de/2015/01/sroeadv-2015-06.html | Not Applicable |
http://packetstormsecurity.com/files/130432/CMS-Piwigo-2.7.3-Cross-Site-Scripting-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
http://piwigo.org/forum/viewtopic.php?id=25179 | Vendor Advisory |
http://seclists.org/fulldisclosure/2015/Feb/73 | Exploit Mailing List Third Party Advisory |
http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-06.html | Not Applicable |
http://www.securityfocus.com/bid/72689 |
Configurations
Information
Published : 2015-02-20 08:59
Updated : 2016-11-29 19:00
NVD link : CVE-2015-2035
Mitre link : CVE-2015-2035
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
piwigo
- piwigo