Piwigo y seguridad

PIWIGO

Reportes de seguridad:

Piwigo Blind SQL Injection Vulnerabilities

8 May. 2015

SQL injection vulnerability in the rate_picture function in include/functions_rate.inc.php in Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary SQL commands via the rate parameter to picture.php, related to an improper data type in a comparison of a non-numeric value that begins with a digit.

Vulnerable Systems:
* Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2

Immune Systems:
* Piwigo after 2.7.2

This bug was found using the portal without authentication. To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol to interact with the application. It is possible to inject SQL code in the variable “rate” on the page “picture.php”.

CVE Information:
CVE-2014-9115

Disclosure Timeline:
Original release date: 12/23/2014
Last revised: 12/23/2014

http://www.securiteam.com/securitynews/5PP2V2AFQA.html

 

Piwigo LocalFiles Editor Plug-in Cross-Site Request Forgery Vulnerability

https://tools.cisco.com/security/center/viewAlert.x?alertId=31407

Version Summary: Piwigo LocalFiles Editor plug-in contains a vulnerability that could allow an unauthenticated, remote attacker to conduct cross-site request forgery attacks on a targeted system. Updates are unavailable.
Description
A vulnerability in the LocalFiles Editor plug-in of Piwigo versions prior to 2.4.7 could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks.

The vulnerability is due to improper validation of certain user-supplied HTTP requests by the /admin.php script. An attacker could exploit this vulnerability by convincing an authenticated administrative user to follow a malicious URL. When processed, the URL could allow the attacker to hijack the authentication of the administrator and could create arbitrary PHP files on the remote server. Successful exploitation could allow the attacker to conduct further attacks.

Proof-of-concept code that demonstrates an exploit of this vulnerability is publicly available.

Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability.

For additional information about CSRF attacks and potential mitigation methods, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Request Forgery Threat Vectors.

Piwigo has released a bug report at the following link: Bug ID 0002844

Piwigo has released updated software at the following link: Piwigo 2.4.7

 

———-

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s