First published: Thu Mar 14 2013(Updated: )
Cross-site request forgery (CSRF) vulnerability in the LocalFiles Editor plugin in Piwigo before 2.4.7 allows remote attackers to hijack the authentication of administrators for requests that create arbitrary PHP files via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | <=2.4.6 | |
Piwigo Piwigo | =1.0.0 | |
Piwigo Piwigo | =1.0.1 | |
Piwigo Piwigo | =1.0.2 | |
Piwigo Piwigo | =1.1.0 | |
Piwigo Piwigo | =1.2.0 | |
Piwigo Piwigo | =1.2.1 | |
Piwigo Piwigo | =1.3.0 | |
Piwigo Piwigo | =1.3.1 | |
Piwigo Piwigo | =1.3.2 | |
Piwigo Piwigo | =1.3.3 | |
Piwigo Piwigo | =1.3.4 | |
Piwigo Piwigo | =1.4.0 | |
Piwigo Piwigo | =1.4.1 | |
Piwigo Piwigo | =1.5.0 | |
Piwigo Piwigo | =1.5.1 | |
Piwigo Piwigo | =1.5.2 | |
Piwigo Piwigo | =1.6.0 | |
Piwigo Piwigo | =1.6.1 | |
Piwigo Piwigo | =1.6.2 | |
Piwigo Piwigo | =1.7.0 | |
Piwigo Piwigo | =1.7.1 | |
Piwigo Piwigo | =1.7.2 | |
Piwigo Piwigo | =1.7.3 | |
Piwigo Piwigo | =2.0 | |
Piwigo Piwigo | =2.0.0 | |
Piwigo Piwigo | =2.0.1 | |
Piwigo Piwigo | =2.0.2 | |
Piwigo Piwigo | =2.0.3 | |
Piwigo Piwigo | =2.0.4 | |
Piwigo Piwigo | =2.0.5 | |
Piwigo Piwigo | =2.0.6 | |
Piwigo Piwigo | =2.0.7 | |
Piwigo Piwigo | =2.0.8 | |
Piwigo Piwigo | =2.0.9 | |
Piwigo Piwigo | =2.0.10 | |
Piwigo Piwigo | =2.1.0 | |
Piwigo Piwigo | =2.1.1 | |
Piwigo Piwigo | =2.1.2 | |
Piwigo Piwigo | =2.1.3 | |
Piwigo Piwigo | =2.1.4 | |
Piwigo Piwigo | =2.1.5 | |
Piwigo Piwigo | =2.1.6 | |
Piwigo Piwigo | =2.2.0 | |
Piwigo Piwigo | =2.2.1 | |
Piwigo Piwigo | =2.2.2 | |
Piwigo Piwigo | =2.2.3 | |
Piwigo Piwigo | =2.2.4 | |
Piwigo Piwigo | =2.2.5 | |
Piwigo Piwigo | =2.3.0 | |
Piwigo Piwigo | =2.3.1 | |
Piwigo Piwigo | =2.3.2 | |
Piwigo Piwigo | =2.3.3 | |
Piwigo Piwigo | =2.3.4 | |
Piwigo Piwigo | =2.3.5 | |
Piwigo Piwigo | =2.4.0 | |
Piwigo Piwigo | =2.4.1 | |
Piwigo Piwigo | =2.4.2 | |
Piwigo Piwigo | =2.4.3 | |
Piwigo Piwigo | =2.4.4 | |
Piwigo Piwigo | =2.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.