Vulnerability Description
SQL injection vulnerability in Piwigo before 2.7.4, when all filters are activated, allows remote authenticated users to execute arbitrary SQL commands via the filter_level parameter in a "Refresh photo set" action in the batch_manager page to admin.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Piwigo | Piwigo | <= 2.7.3 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/130440/Piwigo-2.7.3-SQL-Injection.htmlExploit
- http://piwigo.org/forum/viewtopic.php?id=25179Vendor Advisory
- http://piwigo.org/releases/2.7.4PatchVendor Advisory
- http://www.securityfocus.com/archive/1/534723/100/0/threaded
- http://www.securityfocus.com/bid/72664
- http://packetstormsecurity.com/files/130440/Piwigo-2.7.3-SQL-Injection.htmlExploit
- http://piwigo.org/forum/viewtopic.php?id=25179Vendor Advisory
- http://piwigo.org/releases/2.7.4PatchVendor Advisory
- http://www.securityfocus.com/archive/1/534723/100/0/threaded
- http://www.securityfocus.com/bid/72664
FAQ
What is CVE-2015-1517?
CVE-2015-1517 is a vulnerability with a CVSS score of 6.0 (MEDIUM). SQL injection vulnerability in Piwigo before 2.7.4, when all filters are activated, allows remote authenticated users to execute arbitrary SQL commands via the filter_level parameter in a "Refresh pho...
How severe is CVE-2015-1517?
CVE-2015-1517 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1517?
Check the references section above for vendor advisories and patch information. Affected products include: Piwigo Piwigo.