First published: Tue Jan 03 2017(Updated: )
admin/plugin.php in Piwigo through 2.8.3 doesn't validate the sections variable while using it to include files. This can cause information disclosure and code execution if it contains a .. sequence.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | <=2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10105 is classified as a high severity vulnerability due to its potential for code execution and information disclosure.
To fix CVE-2016-10105, upgrade Piwigo to version 2.8.4 or later where the vulnerability has been addressed.
CVE-2016-10105 can be exploited through directory traversal attacks allowing an attacker to access sensitive files.
CVE-2016-10105 affects Piwigo versions up to and including 2.8.3.
Yes, CVE-2016-10105 can lead to remote code execution if exploited via the insecure handling of the sections variable.