Predictable Token Generation in Piwigo Image Gallery Software by Piwigo
CVE-2016-3735

8.1HIGH

Key Information:

Vendor

Piwigo

Status
Vendor
CVE Published:
28 January 2022

What is CVE-2016-3735?

Piwigo, an open-source image gallery software built in PHP, has a vulnerability that arises when specific criteria are not satisfied on a host. In these cases, Piwigo relies on the mt_rand function to create password reset tokens. Unfortunately, the output generated by mt_rand can be anticipated if an attacker is able to recover the seed value used for its generation. This flaw potentially allows an unauthenticated attacker to seize control of a user's account, provided they know the administrator's email address and can initiate a password reset request.

Affected Version(s)

Piwigo piwigo < 2.8.1

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.