|
Message-ID: <282412323.31981280412192803.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com> Date: Thu, 29 Jul 2010 10:03:12 -0400 (EDT) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: coley <coley@...re.org> Subject: Re: CVE Request: Piwik < 0.6.4 Arbitrary file inclusion Please use CVE-2010-2786 Thanks. -- JB ----- "Anthon Pang" <anthon.pang@...il.com> wrote: > An arbitrary file inclusion vulnerability is fixed by the latest > Piwik > 0.6.4 release. The advisory is (or will be) published here: > http://piwik.org/blog/2010/07/piwik-0-6-4-security-advisory/ > > Description: > > Piwik versions 0.6 through 0.6.3 are vulnerable to arbitrary, remote > file inclusion using a directory traversal pattern in a crafted > request for a data renderer. > > This vulnerability is rated critical, and Piwik users are strongly > encouraged to update to the latest version of Piwik. > > The Piwik project and community thanks Enrico Razza for reporting the > issue.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.