First published: Wed Mar 25 2009(Updated: )
Piwik 0.2.32 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain the API key and other sensitive information via a direct request for misc/cron/archive.sh.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki Matomo | <=0.2.32 | |
MediaWiki Matomo | =0.2.25 | |
MediaWiki Matomo | =0.2.26 | |
MediaWiki Matomo | =0.2.27 | |
MediaWiki Matomo | =0.2.28 | |
MediaWiki Matomo | =0.2.29 | |
MediaWiki Matomo | =0.2.30 | |
MediaWiki Matomo | =0.2.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1085 is classified as a high severity vulnerability due to the unauthorized access to sensitive information.
To fix CVE-2009-1085, update Piwik to version 0.2.33 or later where the vulnerability has been addressed.
CVE-2009-1085 is a directory traversal vulnerability that allows unauthorized access to sensitive files.
Piwik versions 0.2.32 and earlier are affected by CVE-2009-1085.
CVE-2009-1085 allows attackers to access the API key and other sensitive data stored in the affected Piwik installation.