An open redirect vulnerability is present in Piwigo 2.9 and probably prior versions, allowing remote attackers to redirect users to arbitrary web sites and conduct phishing attacks. The identification.php component is affected by this issue: the "redirect" parameter is not validated.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://github.com/Piwigo/Piwigo/issues/706 | issue tracking third party advisory patch |
https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2017-007 | issue tracking third party advisory |