Vulnerability Description
Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Piwigo | Piwigo | < 2.8.1 |
Related Weaknesses (CWE)
References
- http://piwigo.org/release-2.8.1%2C
- https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068dPatchThird Party Advisory
- https://github.com/Piwigo/Piwigo/issues/470%2C
- http://piwigo.org/release-2.8.1%2C
- https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068dPatchThird Party Advisory
- https://github.com/Piwigo/Piwigo/issues/470%2C
FAQ
What is CVE-2016-3735?
CVE-2016-3735 is a vulnerability with a CVSS score of 8.1 (HIGH). Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after...
How severe is CVE-2016-3735?
CVE-2016-3735 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3735?
Check the references section above for vendor advisories and patch information. Affected products include: Piwigo Piwigo.