This plugin is vulnerable to a Stored Cross Site Scripting vulnerability,This issue was exploited when administrator users with access to “Google Analytics by Yoast” Setting in wordpress above listed vulnerable parameter is vulnerable for stored XSS. A malicious administration can hijack other users session, take control of another administrator’s browser or install malware on their computer.
Google Analytics — Yes, it is a security risk
Security and privacy in Universal Analytics
! Este post “desaparece” porque Google redirecciona automáticamente
Reportes de seguridad:
Piwigo Blind SQL Injection Vulnerabilities
8 May. 2015
SQL injection vulnerability in the rate_picture function in include/functions_rate.inc.php in Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary SQL commands via the rate parameter to picture.php, related to an improper data type in a comparison of a non-numeric value that begins with a digit.
* Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2
* Piwigo after 2.7.2
This bug was found using the portal without authentication. To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol to interact with the application. It is possible to inject SQL code in the variable “rate” on the page “picture.php”.
Original release date: 12/23/2014
Last revised: 12/23/2014
Piwigo LocalFiles Editor Plug-in Cross-Site Request Forgery Vulnerability
||Piwigo LocalFiles Editor plug-in contains a vulnerability that could allow an unauthenticated, remote attacker to conduct cross-site request forgery attacks on a targeted system. Updates are unavailable.
|A vulnerability in the LocalFiles Editor plug-in of Piwigo versions prior to 2.4.7 could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks.
The vulnerability is due to improper validation of certain user-supplied HTTP requests by the /admin.php script. An attacker could exploit this vulnerability by convincing an authenticated administrative user to follow a malicious URL. When processed, the URL could allow the attacker to hijack the authentication of the administrator and could create arbitrary PHP files on the remote server. Successful exploitation could allow the attacker to conduct further attacks.
Proof-of-concept code that demonstrates an exploit of this vulnerability is publicly available.
Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability.
For additional information about CSRF attacks and potential mitigation methods, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Request Forgery Threat Vectors.
Piwigo has released a bug report at the following link: Bug ID 0002844
Piwigo has released updated software at the following link: Piwigo 2.4.7