Advertisement






Piwigo v13.7.0 Stored Cross-Site Scripting (XSS) (Authenticated)

CVE Category Price Severity
CWE-79 $500 High
Author Risk Exploitation Type Date
High Remote 2023-07-06
CVSS
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023070016

Below is a copy:

Piwigo v13.7.0 Stored Cross-Site Scripting (XSS) (Authenticated)
#Exploit Title: Piwigo v13.7.0 - Stored Cross-Site Scripting (XSS) (Authenticated)
#Date: 25 June 2023
#Exploit Author: Okan Kurtulus
#Vendor Homepage: https://piwigo.org
#Version: 13.7.0
#Tested on: Ubuntu 22.04
#CVE : N/A

# Proof of Concept:
1 Install the system through the website and log in with any user authorized to upload photos.
2  Click "Add" under "Photos" from the left menu. The photo you want to upload is selected and uploaded.
3 Click on the uploaded photo and the photo editing screen opens. XSS payload is entered in the "Description" section on this screen. After saving the file, go to the homepage and open the page with the photo. The XSS payload appears to be triggered.

#Payload
<sCriPt>alert(1);</sCriPt>

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.