Vulnerabilities > CVE-2016-3735 - Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Piwigo
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- http://piwigo.org/release-2.8.1%2C
- http://piwigo.org/release-2.8.1%2C
- https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d
- https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d
- https://github.com/Piwigo/Piwigo/issues/470%2C
- https://github.com/Piwigo/Piwigo/issues/470%2C