First published: Thu Mar 21 2013(Updated: )
Piwik before 1.11 accepts input from a POST request instead of a GET request in unspecified circumstances, which might allow attackers to obtain sensitive information by leveraging the logging of parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki Matomo | <=1.10.1 | |
MediaWiki Matomo | =1.0 | |
MediaWiki Matomo | =1.1 | |
MediaWiki Matomo | =1.1.1 | |
MediaWiki Matomo | =1.2 | |
MediaWiki Matomo | =1.2.1 | |
MediaWiki Matomo | =1.3 | |
MediaWiki Matomo | =1.4 | |
MediaWiki Matomo | =1.5 | |
MediaWiki Matomo | =1.5.1 | |
MediaWiki Matomo | =1.6 | |
MediaWiki Matomo | =1.7 | |
MediaWiki Matomo | =1.7.1 | |
MediaWiki Matomo | =1.8 | |
MediaWiki Matomo | =1.8.1 | |
MediaWiki Matomo | =1.8.2 | |
MediaWiki Matomo | =1.8.3 | |
MediaWiki Matomo | =1.8.4 | |
MediaWiki Matomo | =1.9.1 | |
MediaWiki Matomo | =1.9.2 | |
MediaWiki Matomo | =1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2633 is classified as a moderate severity vulnerability.
To fix CVE-2013-2633, upgrade to Piwik version 1.11 or later.
CVE-2013-2633 may allow attackers to obtain sensitive information through improperly logged POST request parameters.
CVE-2013-2633 affects Piwik versions prior to 1.11, specifically from 1.0 to 1.10.1.
CVE-2013-2633 impacts all installations of Piwik up to version 1.10.1.