Cross-site Request Forgery (CSRF) in Plogger
|Vulnerable Versions:||1.0 RC1 and probably prior|
|Tested Version:||1.0 RC1|
|Advisory Publication:||March 29, 2011 [without technical details]|
|Vendor Notification:||March 29, 2011|
|Public Disclosure:||April 12, 2011|
|Vulnerability Type:||Cross-Site Request Forgery [CWE-352]|
|CVSSv2 Base Score:||4 (AV:N/AC:H/Au:N/C:N/I:P/A:P)|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge SA Security Research Lab has discovered multiple vulnerabilities in Plogger which could be exploited to perform cross-site request forgery attacks.
|Currently we are not aware of any vendor-supplied patches or other solutions. The vendor was contacted in accordance to our Vendor Notification Policy but we didn't get any answer or feedback.|
| High-Tech Bridge Advisory HTB22925 - https://www.immuniweb.com/advisory/HTB22925 - Cross-site Request Forgery (CSRF) in Plogger|
 Plogger - plogger.org - Plogger is the next generation in open-source photo gallery systems.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.