First published: Tue Dec 23 2014(Updated: )
SQL injection vulnerability in the rate_picture function in include/functions_rate.inc.php in Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary SQL commands via the rate parameter to picture.php, related to an improper data type in a comparison of a non-numeric value that begins with a digit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | <=2.5.5 | |
Piwigo Piwigo | =2.6.0 | |
Piwigo Piwigo | =2.6.1 | |
Piwigo Piwigo | =2.6.2 | |
Piwigo Piwigo | =2.6.3 | |
Piwigo Piwigo | =2.7.0 | |
Piwigo Piwigo | =2.7.0-beta1 | |
Piwigo Piwigo | =2.7.0-beta2 | |
Piwigo Piwigo | =2.7.0-rc1 | |
Piwigo Piwigo | =2.7.0-rc2 | |
Piwigo Piwigo | =2.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.