SQL injection vulnerability in the administrative backend in Piwigo before 2.7.4 allows remote administrators to execute arbitrary SQL commands via the user parameter in the history page to admin.php.
References
| Link | Resource |
|---|---|
| http://piwigo.org/releases/2.7.4 | Patch Release Notes Vendor Advisory |
| http://sroesemann.blogspot.de/2015/01/sroeadv-2015-06.html | Not Applicable |
| http://packetstormsecurity.com/files/130432/CMS-Piwigo-2.7.3-Cross-Site-Scripting-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
| http://piwigo.org/forum/viewtopic.php?id=25179 | Vendor Advisory |
| http://seclists.org/fulldisclosure/2015/Feb/73 | Exploit Mailing List Third Party Advisory |
| http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-06.html | Not Applicable |
| http://www.securityfocus.com/bid/72689 |
Configurations
Information
Published : 2015-02-20 08:59
Updated : 2016-11-29 19:00
NVD link : CVE-2015-2035
Mitre link : CVE-2015-2035
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
piwigo
- piwigo


