Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 19 Feb 2015 19:27:31 -0500 (EST)
From: cve-assign@...re.org
To: steffen.roesemann1986@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE-Request -- Piwigo <= v. 2.7.3 -- Reflecting XSS- and SQLi-vulnerability in administrative backend

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> The reflecting XSS vulnerability resides in the "page" parameter used in
> the file admin.php which can be found in the administrative backend

Use CVE-2015-2034.


> The SQL injection vulnerability can as well be found in the administrative
> backend and can be found in the "History" functionality

Use CVE-2015-2035.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJU5n8dAAoJEKllVAevmvmsBGAH/iAnJvlIEeHYbfuMtAR3fMgw
V0IpzOvu7QochzHf9yfqIX9rQKHl7k8dSZyG1DBFfLR1QvOFvr8BoC6TtMV6fgwS
JDY1cyjkmHwbNuuRDBgNv4EYJOQhdEGSMDkQaQUZPBkjgtUQkzSWIk5ZnTtsTWX9
Sz90zzFcgpdYrQo6WQnTlS2USYSOILz0RcpJRtkx/gukTfmQgMgy/gqS29paXDsg
1RMlanW7+J4WtaQgirucjMC9FTPKoXF47/Ink4tXgB1ZIii3+1+JHSisjk+AhfeR
ZdJMlMEaimLJCihQ33v1tqXc6FcfSA2aU+dXAZ4n7lmtvLeiSF6zCtLT0pb6m3A=
=qH4s
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.