FreeBSD : piwigo -- CSRF/Path Traversal (edd201a5-8fc3-11e2-b131-000c299b62e1)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

High-Tech Bridge Security Research Lab reports :

The CSRF vulnerability exists due to insufficient verification of the
HTTP request origin in '/admin.php' script. A remote attacker can
trick a logged-in administrator to visit a specially crafted webpage
and create arbitrary PHP file on the remote server.

The path traversal vulnerability exists due to insufficient filtration
of user-supplied input in 'dl' HTTP GET parameter passed to
'/install.php' script. The script is present on the system after
installation by default, and can be accessed by attacker without any
restrictions.

See also :

http://piwigo.org/bugs/view.php?id=0002843
http://piwigo.org/bugs/view.php?id=0002844
http://www.nessus.org/u?992cf829
http://www.nessus.org/u?bbbacade

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 65624 ()

Bugtraq ID:

CVE ID: CVE-2013-1468
CVE-2013-1469

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now