Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 24 Jun 2014 01:51:33 -0400 (EDT)
From: cve-assign@...re.org
To: hanno@...eck.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: piwigo before 2.6.3 sql injection

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> The Piwigo image gallery contains an sql injection before versions
> 2.6.3 and 2.7.0_beta2
> http://piwigo.org/bugs/view.php?id=3089
> http://piwigo.org/dev/changeset/28678
> http://piwigo.org/forum/viewtopic.php?id=24009

Are you sure about this? Changeset 28678 doesn't seem to have been
implemented in the
http://piwigo.org/download/dlcounter.php?code=26xto263 file that's
recommended in the 2.6.3 Release Notes. Also,
http://piwigo.org/bugs/changelog_page.php suggests that 3089 was fixed
only in 2.7.0beta2, not in 2.6.3.

http://piwigo.org/releases/2.6.3 says "[security] security failure
reported and fixed by Christopher Chrapka, ojezu.org." Is this instead
perhaps an unspecified vulnerability that is unrelated to the fix for
bug 3089?

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTqRGSAAoJEKllVAevmvmsHlcIAMDmhzYQds1t5ZkPQomsaHsp
ohF0honGOLkkbpYL2/OPf+7vpTeRE3TJk9UeNH0KIOhYLsPGFNd1bnJLwxCHjoBN
sk1ALJ4lKhf58QI6d9GRRKJ9dfpaMSBrYm5L7D76Jaftet7pdFu1UKO3n4gVqqAo
dQ7db3sQffxc3Geh1QTMAF7PCt8XYgFuR/lQ6KCKsKcYn/e/12qGS+PXI4FDDlxA
xXIorMmRqTTWQjYXxQ/WyAXgKhs8Qm1hxwJ3HHtlMtBN98WXOOl/3na4pGMKB7OE
CEYXuMCHJ8ua/208zPO4Re4Zz1ijLwarRj2ND2wV0TL+AY5p13WXEs3v2Q74LLc=
=JMVl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ