Cross-site request forgery (CSRF) vulnerability in the administration panel in Piwigo before 2.6.2 allows remote attackers to hijack the authentication of administrators for requests that add users via a pwg.users.add action in a request to ws.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://seclists.org/oss-sec/2014/q2/623 | third party advisory mailing list |
http://www.exploit-db.com/exploits/31916 | exploit vdb entry third party advisory |
http://www.securityfocus.com/bid/65811 | vdb entry third party advisory |
http://seclists.org/oss-sec/2014/q2/610 | third party advisory mailing list |
http://osvdb.org/show/osvdb/103774 | vdb entry broken link |
http://piwigo.org/bugs/view.php?id=0003055 | issue tracking vendor advisory |
http://piwigo.org/releases/2.6.2 | release notes |
http://packetstormsecurity.com/files/125438/Piwigo-2.6.1-Cross-Site-Request-Forgery.html | exploit vdb entry third party advisory |