First published: Fri Jul 07 2023(Updated: )
Piwigo is open source photo gallery software. Prior to version 13.8.0, there is a SQL Injection vulnerability in the login of the administrator screen. The SQL statement that acquires the HTTP Header `User-Agent` is vulnerable at the endpoint that records user information when logging in to the administrator screen. It is possible to execute arbitrary SQL statements. Someone who wants to exploit the vulnerability must be log in to the administrator screen, even with low privileges. Any SQL statement can be executed. Doing so may leak information from the database. Version 13.8.0 contains a fix for this issue. As another mitigation, those who want to execute a SQL statement verbatim with user-enterable parameters should be sure to escape the parameter contents appropriately.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | <13.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37270 is a SQL Injection vulnerability in the login of the administrator screen in Piwigo photo gallery software prior to version 13.8.0.
CVE-2023-37270 has a severity rating of 8.8, which is considered high.
Versions of Piwigo prior to 13.8.0 are affected by CVE-2023-37270.
To fix CVE-2023-37270, you should update Piwigo to version 13.8.0 or higher.
You can find more information about CVE-2023-37270 in the references provided: [Link 1](https://github.com/Piwigo/Piwigo/blob/c01ec38bc43f09424a8d404719c35f963d63cf00/include/dblayer/functions_mysqli.inc.php#L491), [Link 2](https://github.com/Piwigo/Piwigo/blob/c01ec38bc43f09424a8d404719c35f963d63cf00/include/functions.inc.php#L621), [Link 3](https://github.com/Piwigo/Piwigo/commit/978425527d6c113887f845d75cf982bbb62d761a).