Summary
Detail | |||
---|---|---|---|
Vendor | Spip | First view | 2009-01-02 |
Product | Spip | Last view | 2024-09-06 |
Version | 1.9.2f | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:spip:spip |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2024-09-06 | CVE-2024-8517 | SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request. |
6.1 | 2024-01-19 | CVE-2024-23659 | SPIP before 4.1.14 and 4.2.x before 4.2.8 allows XSS via the name of an uploaded file. This is related to javascript/bigup.js and javascript/bigup.utils.js. |
6.1 | 2024-01-04 | CVE-2023-52322 | ecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics. |
9.8 | 2023-02-28 | CVE-2023-27372 | SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1. |
9.8 | 2023-02-27 | CVE-2023-24258 | SPIP v4.1.5 and earlier was discovered to contain a SQL injection vulnerability via the _oups parameter. This vulnerability allows attackers to execute arbitrary code via a crafted POST request. |
8.8 | 2022-12-14 | CVE-2022-37155 | RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via the _oups parameter. |
8.8 | 2022-05-19 | CVE-2022-28961 | Spip Web Framework v3.1.13 and below was discovered to contain multiple SQL injection vulnerabilities at /ecrire via the lier_trad and where parameters. |
8.8 | 2022-05-19 | CVE-2022-28960 | A PHP injection vulnerability in Spip before v3.2.8 allows attackers to execute arbitrary PHP code via the _oups parameter at /ecrire. |
6.1 | 2022-05-19 | CVE-2022-28959 | Multiple cross-site scripting (XSS) vulnerabilities in the component /spip.php of Spip Web Framework v3.1.13 and below allows attackers to execute arbitrary web scripts or HTML. |
5.3 | 2022-03-10 | CVE-2022-26847 | SPIP before 3.2.14 and 4.x before 4.0.5 allows unauthenticated access to information about editorial objects. |
8.8 | 2022-03-10 | CVE-2022-26846 | SPIP before 3.2.14 and 4.x before 4.0.5 allows remote authenticated editors to execute arbitrary code. |
9.8 | 2020-11-23 | CVE-2020-28984 | prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters. |
6.5 | 2019-12-17 | CVE-2019-19830 | _core_/plugins/medias in SPIP 3.2.x before 3.2.7 allows remote authenticated authors to inject content into the database. |
5.3 | 2019-09-17 | CVE-2019-16394 | SPIP before 3.1.11 and 3.2 before 3.2.5 provides different error messages from the password-reminder page depending on whether an e-mail address exists, which might help attackers to enumerate subscribers. |
6.1 | 2019-09-17 | CVE-2019-16393 | SPIP before 3.1.11 and 3.2 before 3.2.5 mishandles redirect URLs in ecrire/inc/headers.php with a %0D, %0A, or %20 character. |
6.1 | 2019-09-17 | CVE-2019-16392 | SPIP before 3.1.11 and 3.2 before 3.2.5 allows prive/formulaires/login.php XSS via error messages. |
6.5 | 2019-09-17 | CVE-2019-16391 | SPIP before 3.1.11 and 3.2 before 3.2.5 allows authenticated visitors to modify any published content and execute other modifications in the database. This is related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php. |
8.8 | 2019-04-10 | CVE-2019-11071 | SPIP 3.1 before 3.1.10 and 3.2 before 3.2.4 allows authenticated visitors to execute arbitrary code on the host server because var_memotri is mishandled. |
6.1 | 2017-10-22 | CVE-2017-15736 | Cross-site scripting (XSS) vulnerability (stored) in SPIP before 3.1.7 allows remote attackers to inject arbitrary web script or HTML via a crafted string, as demonstrated by a PGP field, related to prive/objets/contenu/auteur.html and ecrire/inc/texte_mini.php. |
7.4 | 2017-01-18 | CVE-2016-7999 | ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to conduct server side request forgery (SSRF) attacks via a URL in the var_url parameter in a valider_xml action. |
8.8 | 2017-01-18 | CVE-2016-7998 | The SPIP template composer/compiler in SPIP 3.1.2 and earlier allows remote authenticated users to execute arbitrary PHP code by uploading an HTML file with a crafted (1) INCLUDE or (2) INCLURE tag and then accessing it with a valider_xml action. |
7.5 | 2017-01-18 | CVE-2016-7982 | Directory traversal vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to enumerate the files on the system via the var_url parameter in a valider_xml action. |
6.1 | 2017-01-18 | CVE-2016-7981 | Cross-site scripting (XSS) vulnerability in valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the var_url parameter in a valider_xml action. |
8.8 | 2017-01-18 | CVE-2016-7980 | Cross-site request forgery (CSRF) vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to hijack the authentication of administrators for requests that execute the XML validator on a local file via a crafted valider_xml request. NOTE: this issue can be combined with CVE-2016-7998 to execute arbitrary PHP code. |
4.3 | 2014-01-30 | CVE-2013-7303 | Multiple cross-site scripting (XSS) vulnerabilities in (1) squelettes-dist/formulaires/inscription.php and (2) prive/forms/editer_auteur.php in SPIP before 2.1.25 and 3.0.x before 3.0.13 allow remote attackers to inject arbitrary web script or HTML via the author name field. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
40% (8) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
15% (3) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
10% (2) | CWE-352 | Cross-Site Request Forgery (CSRF) |
10% (2) | CWE-20 | Improper Input Validation |
5% (1) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
5% (1) | CWE-203 | Information Exposure Through Discrepancy |
5% (1) | CWE-200 | Information Exposure |
5% (1) | CWE-116 | Improper Encoding or Escaping of Output |
5% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
SAINT Exploits
Description | Link |
---|---|
SPIP password reset serialization vulnerability | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
76183 | SPIP CMS Unspecified SQL Injection |
51140 | SPIP inc/rubriques.php ID Parameter SQL Injection |
51137 | SPIP Multiple Unspecified Issues |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-06-15 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4228.nasl - Type: ACT_GATHER_INFO |
2016-11-03 | Name: The remote Debian host is missing a security update. File: debian_DLA-695.nasl - Type: ACT_GATHER_INFO |
2013-11-21 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-2794.nasl - Type: ACT_GATHER_INFO |