Vulnerability identifier: #VU3120
Vulnerability risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-10083
CWE-ID:
CWE-79
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Piwigo
Web applications /
CMS
Vendor: Piwigo.org
Description
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data passed to /admin/plugin.php script. A remote attacker can create a specially crafted web link, trick the website administrator into visiting it and execute arbitrary HTML and script code in victim’s browser in context of vulnerable website.
Successful exploitation of the vulnerability may allow an attacker to perform phishing or drive-by-download attacks, as well as steal cookies and manipulate web page content.
Mitigation
Update to version 2.8.5.
Vulnerable software versions
Piwigo: 2.8.0 - 2.8.4
External links
https://piwigo.org/releases/2.8.5
https://github.com/Piwigo/Piwigo/issues/575
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.