Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Piwigo's secret key can be brute forced
Vulnerability Description
Piwigo is an open source photo gallery application for the web. In versions on the 14.x branch, when installing, the secret_key configuration parameter is set to MD5(RAND()) in MySQL. However, RAND() only has 30 bits of randomness, making it feasible to brute-force the secret key. The CSRF token is constructed partially from the secret key, and this can be used to check if the brute force succeeded. Trying all possible values takes approximately one hour. The impact of this is limited. The auto login key uses the user's password on top of the secret key. The pwg token uses the user's session identifier on top of the secret key. It seems that values for get_ephemeral_key can be generated when one knows the secret key. Version 15.0.0 contains a fix for the issue.
CVSS Information
N/A
Vulnerability Type
使用不充分的随机数
Vulnerability Title
Piwigo 安全特征问题漏洞
Vulnerability Description
Piwigo是Piwigo开源的一套基于Web的开源图片库软件。该软件包括图片管理、图片分类和权限管理等功能。 Piwigo 15.0.0之前版本存在安全特征问题漏洞,该漏洞源于安装时secret_key配置参数使用MySQL的MD5(RAND())设置,而RAND()仅提供30位随机性,使得暴力破解密钥成为可能,可能导致跨站请求伪造攻击。
CVSS Information
N/A
Vulnerability Type
N/A