SQL injection vulnerability in the rate_picture function in include/functions_rate.inc.php in Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary SQL commands via the rate parameter to picture.php, related to an improper data type in a comparison of a non-numeric value that begins with a digit.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://piwigo.org/dev/changeset/30563/trunk/include/functions_rate.inc.php - | |
References | () http://piwigo.org/forum/viewtopic.php?id=24850 - Vendor Advisory | |
References | () http://piwigo.org/releases/2.7.2 - Patch | |
References | () http://seclists.org/fulldisclosure/2014/Nov/23 - Exploit |
Information
Published : 2014-12-23 11:59
Updated : 2024-11-21 02:20
NVD link : CVE-2014-9115
Mitre link : CVE-2014-9115
CVE.ORG link : CVE-2014-9115
JSON object : View
Products Affected
piwigo
- piwigo
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')