First published: Fri Jan 28 2022(Updated: )
Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | <2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3735 is a vulnerability in the Piwigo image gallery software that allows an unauthenticated attacker to take over an account.
CVE-2016-3735 has a severity of 8.1 which is considered high.
CVE-2016-3735 affects Piwigo software versions up to and excluding 2.8.1.
An attacker can exploit CVE-2016-3735 by predicting the output of the mt_rand function used to generate password reset tokens.
Yes, Piwigo software versions after 2.8.1 have addressed the vulnerability. Users are advised to update to the latest version.