First published: Mon Aug 02 2010(Updated: )
Directory traversal vulnerability in Piwik 0.6 through 0.6.3 allows remote attackers to include arbitrary local files and possibly have unspecified other impact via directory traversal sequences in a crafted data-renderer request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki Matomo | =0.6 | |
MediaWiki Matomo | =0.6.1 | |
MediaWiki Matomo | =0.6.2 | |
MediaWiki Matomo | =0.6.3-rc1 | |
MediaWiki Matomo | =0.6.3 | |
MediaWiki Matomo | =0.6.3-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2786 is considered to have a medium severity due to its potential for arbitrary file inclusion.
To fix CVE-2010-2786, upgrade Piwik to version 0.6.4 or later, which addresses this vulnerability.
CVE-2010-2786 allows attackers to conduct remote file inclusion attacks, potentially leading to code execution on the server.
CVE-2010-2786 affects Piwik versions 0.6 through 0.6.3.
If you are using a version of Piwik later than 0.6.4, CVE-2010-2786 is no longer a risk.