Google Analytics y seguridad

Critical Security Vulnerability in Google Analytics by Yoast #319

About Vulnerability

This plugin is vulnerable to a Stored Cross Site Scripting vulnerability,This issue was exploited when administrator users with access to “Google Analytics by Yoast” Setting in wordpress above listed vulnerable parameter is vulnerable for stored XSS. A malicious administration can hijack other users session, take control of another administrator’s browser or install malware on their computer.



Google Analytics — Yes, it is a security risk

Obama’s website, Mountain View’s javascript

Analysis Judging from some of the comments responding to our story about security sloppiness on Barack Obama’s website, it’s clear a discussion about the risks of third-party javascript is in order. Contrary to what many commentators believe, widgets used by Google Analytics and similar services do represent a threat, especially if you’re a high-profile target.



Security and privacy in Universal Analytics


! Este post “desaparece” porque Google redirecciona automáticamente!topic/analytics/GdmiI_-VvsQ




Piwigo y seguridad


Reportes de seguridad:

Piwigo Blind SQL Injection Vulnerabilities

8 May. 2015

SQL injection vulnerability in the rate_picture function in include/ in Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary SQL commands via the rate parameter to picture.php, related to an improper data type in a comparison of a non-numeric value that begins with a digit.

Vulnerable Systems:
* Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2

Immune Systems:
* Piwigo after 2.7.2

This bug was found using the portal without authentication. To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol to interact with the application. It is possible to inject SQL code in the variable “rate” on the page “picture.php”.

CVE Information:

Disclosure Timeline:
Original release date: 12/23/2014
Last revised: 12/23/2014


Piwigo LocalFiles Editor Plug-in Cross-Site Request Forgery Vulnerability

Version Summary: Piwigo LocalFiles Editor plug-in contains a vulnerability that could allow an unauthenticated, remote attacker to conduct cross-site request forgery attacks on a targeted system. Updates are unavailable.
A vulnerability in the LocalFiles Editor plug-in of Piwigo versions prior to 2.4.7 could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks.

The vulnerability is due to improper validation of certain user-supplied HTTP requests by the /admin.php script. An attacker could exploit this vulnerability by convincing an authenticated administrative user to follow a malicious URL. When processed, the URL could allow the attacker to hijack the authentication of the administrator and could create arbitrary PHP files on the remote server. Successful exploitation could allow the attacker to conduct further attacks.

Proof-of-concept code that demonstrates an exploit of this vulnerability is publicly available.

Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability.

For additional information about CSRF attacks and potential mitigation methods, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Request Forgery Threat Vectors.

Piwigo has released a bug report at the following link: Bug ID 0002844

Piwigo has released updated software at the following link: Piwigo 2.4.7