Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17827

Опубликовано: 21 дек. 2017
Источник: debian
EPSS Низкий

Описание

Piwigo 2.9.2 is vulnerable to Cross-Site Request Forgery via /admin.php?page=configuration&section=main or /admin.php?page=batch_manager&mode=unit. An attacker can exploit this to coerce an admin user into performing unintended actions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
piwigoremovedpackage

Примечания

  • https://github.com/Piwigo/Piwigo/issues/822

  • https://github.com/Piwigo/Piwigo/commit/c3b4c6f7f0ddeaea492080fb8211d7b4cfedaf6f

  • https://github.com/Piwigo/Piwigo/commit/77f02bfd76ed13dd14044d04cdd8d28213e1848d

EPSS

Процентиль: 38%
0.00166
Низкий

Связанные уязвимости

CVSS3: 8.8
nvd
около 8 лет назад

Piwigo 2.9.2 is vulnerable to Cross-Site Request Forgery via /admin.php?page=configuration&section=main or /admin.php?page=batch_manager&mode=unit. An attacker can exploit this to coerce an admin user into performing unintended actions.

CVSS3: 8.8
github
больше 3 лет назад

Piwigo 2.9.2 is vulnerable to Cross-Site Request Forgery via /admin.php?page=configuration&section=main or /admin.php?page=batch_manager&mode=unit. An attacker can exploit this to coerce an admin user into performing unintended actions.

EPSS

Процентиль: 38%
0.00166
Низкий