Description
|
|
High-Tech Bridge SA has discovered some vulnerabilities in Piwigo, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed via the "section" parameter (when "page" is set to "configuration"), the "installstatus" (when "page" is set to "languages_new"), and the "theme" parameter (when "page" is set to "theme") to admin.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are confirmed in version 2.3.3. Prior versions may also be affected.
|