|
Message-ID: <AANLkTi=Zx5+m7TJ8urf0JNg9=X9LcYsL-STi7_9xZVzG@mail.gmail.com> Date: Wed, 28 Jul 2010 11:02:03 -0400 From: Anthon Pang <anthon.pang@...il.com> To: oss-security <oss-security@...ts.openwall.com> Subject: CVE Request: Piwik < 0.6.4 Arbitrary file inclusion An arbitrary file inclusion vulnerability is fixed by the latest Piwik 0.6.4 release. The advisory is (or will be) published here: http://piwik.org/blog/2010/07/piwik-0-6-4-security-advisory/ Description: Piwik versions 0.6 through 0.6.3 are vulnerable to arbitrary, remote file inclusion using a directory traversal pattern in a crafted request for a data renderer. This vulnerability is rated critical, and Piwik users are strongly encouraged to update to the latest version of Piwik. The Piwik project and community thanks Enrico Razza for reporting the issue.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.