First published: Fri Dec 30 2016(Updated: )
admin/batch_manager.php in Piwigo through 2.8.3 allows remote authenticated administrators to conduct File Inclusion attacks via the $page['tab'] variable (aka the mode parameter).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | <=2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10084 is considered a medium-severity vulnerability due to its potential for remote file inclusion attacks.
To fix CVE-2016-10084, upgrade Piwigo to version 2.8.4 or later, which addresses the vulnerability.
CVE-2016-10084 affects Piwigo versions prior to 2.8.4, specifically versions up to 2.8.3.
Yes, CVE-2016-10084 can be exploited remotely by authenticated administrators.
The attack in CVE-2016-10084 is a File Inclusion vulnerability that allows attackers to include arbitrary files.