First published: Tue Dec 23 2014(Updated: )
SQL injection vulnerability in the rate_picture function in include/functions_rate.inc.php in Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary SQL commands via the rate parameter to picture.php, related to an improper data type in a comparison of a non-numeric value that begins with a digit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | <=2.5.5 | |
Piwigo Piwigo | =2.6.0 | |
Piwigo Piwigo | =2.6.1 | |
Piwigo Piwigo | =2.6.2 | |
Piwigo Piwigo | =2.6.3 | |
Piwigo Piwigo | =2.7.0 | |
Piwigo Piwigo | =2.7.0-beta1 | |
Piwigo Piwigo | =2.7.0-beta2 | |
Piwigo Piwigo | =2.7.0-rc1 | |
Piwigo Piwigo | =2.7.0-rc2 | |
Piwigo Piwigo | =2.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9115 is classified as a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary SQL commands.
To fix CVE-2014-9115, upgrade to Piwigo version 2.7.2 or later.
CVE-2014-9115 affects Piwigo versions before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2.
There is no official workaround for CVE-2014-9115; the recommended action is to update to the latest version.
Yes, CVE-2014-9115 can potentially lead to data loss as it allows attackers to execute arbitrary SQL commands.