Vulnerability Description
Piwigo 2.9.2 is vulnerable to Cross-Site Request Forgery via /admin.php?page=configuration§ion=main or /admin.php?page=batch_manager&mode=unit. An attacker can exploit this to coerce an admin user into performing unintended actions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Piwigo | Piwigo | 2.9.2 |
Related Weaknesses (CWE)
References
- https://github.com/Piwigo/Piwigo/commit/c3b4c6f7f0ddeaea492080fb8211d7b4cfedaf6fThird Party Advisory
- https://github.com/Piwigo/Piwigo/issues/822Third Party Advisory
- https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/PiThird Party Advisory
- https://github.com/Piwigo/Piwigo/commit/c3b4c6f7f0ddeaea492080fb8211d7b4cfedaf6fThird Party Advisory
- https://github.com/Piwigo/Piwigo/issues/822Third Party Advisory
- https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/PiThird Party Advisory
FAQ
What is CVE-2017-17827?
CVE-2017-17827 is a vulnerability with a CVSS score of 8.8 (HIGH). Piwigo 2.9.2 is vulnerable to Cross-Site Request Forgery via /admin.php?page=configuration§ion=main or /admin.php?page=batch_manager&mode=unit. An attacker can exploit this to coerce an admin user...
How severe is CVE-2017-17827?
CVE-2017-17827 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17827?
Check the references section above for vendor advisories and patch information. Affected products include: Piwigo Piwigo.