CVE-2016-3735

Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.
Configurations

Configuration 1 (hide)

cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:32

Type Values Removed Values Added
References
  • {'url': 'http://piwigo.org/release-2.8.1,', 'name': 'http://piwigo.org/release-2.8.1,', 'tags': ['Broken Link'], 'refsource': 'MISC'}
  • {'url': 'https://github.com/Piwigo/Piwigo/issues/470,', 'name': 'https://github.com/Piwigo/Piwigo/issues/470,', 'tags': ['Broken Link'], 'refsource': 'MISC'}
  • () https://github.com/Piwigo/Piwigo/issues/470%2C -
  • () http://piwigo.org/release-2.8.1%2C -

Information

Published : 2022-01-28 20:15

Updated : 2024-02-28 18:48


NVD link : CVE-2016-3735

Mitre link : CVE-2016-3735

CVE.ORG link : CVE-2016-3735


JSON object : View

Products Affected

piwigo

  • piwigo
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)