Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 24 Jun 2014 01:51:33 -0400 (EDT)
From: cve-assign@...re.org
To: hanno@...eck.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: piwigo before 2.6.3 sql injection

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> The Piwigo image gallery contains an sql injection before versions
> 2.6.3 and 2.7.0_beta2
> http://piwigo.org/bugs/view.php?id=3089
> http://piwigo.org/dev/changeset/28678
> http://piwigo.org/forum/viewtopic.php?id=24009

Are you sure about this? Changeset 28678 doesn't seem to have been
implemented in the
http://piwigo.org/download/dlcounter.php?code=26xto263 file that's
recommended in the 2.6.3 Release Notes. Also,
http://piwigo.org/bugs/changelog_page.php suggests that 3089 was fixed
only in 2.7.0beta2, not in 2.6.3.

http://piwigo.org/releases/2.6.3 says "[security] security failure
reported and fixed by Christopher Chrapka, ojezu.org." Is this instead
perhaps an unspecified vulnerability that is unrelated to the fix for
bug 3089?

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTqRGSAAoJEKllVAevmvmsHlcIAMDmhzYQds1t5ZkPQomsaHsp
ohF0honGOLkkbpYL2/OPf+7vpTeRE3TJk9UeNH0KIOhYLsPGFNd1bnJLwxCHjoBN
sk1ALJ4lKhf58QI6d9GRRKJ9dfpaMSBrYm5L7D76Jaftet7pdFu1UKO3n4gVqqAo
dQ7db3sQffxc3Geh1QTMAF7PCt8XYgFuR/lQ6KCKsKcYn/e/12qGS+PXI4FDDlxA
xXIorMmRqTTWQjYXxQ/WyAXgKhs8Qm1hxwJ3HHtlMtBN98WXOOl/3na4pGMKB7OE
CEYXuMCHJ8ua/208zPO4Re4Zz1ijLwarRj2ND2wV0TL+AY5p13WXEs3v2Q74LLc=
=JMVl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.