First published: Fri Feb 20 2015(Updated: )
SQL injection vulnerability in Piwigo before 2.7.4, when all filters are activated, allows remote authenticated users to execute arbitrary SQL commands via the filter_level parameter in a "Refresh photo set" action in the batch_manager page to admin.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | <=2.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1517 is considered a medium severity vulnerability due to its potential for SQL injection by authenticated users.
To fix CVE-2015-1517, upgrade Piwigo to version 2.7.4 or later.
CVE-2015-1517 affects all users of Piwigo versions prior to 2.7.4 when all filters are activated.
CVE-2015-1517 is an SQL injection vulnerability that allows execution of arbitrary SQL commands.
CVE-2015-1517 impacts the 'Refresh photo set' action on the batch_manager page within admin.php.