CVE-2013-4557

The Security Screen (_core_/securite/ecran_securite.php) before 1.1.8 for SPIP, as used in SPIP 3.0.x before 3.0.12, allows remote attackers to execute arbitrary PHP via the connect parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:spip:spip:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:3.0.11:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://secunia.com/advisories/55551 - Vendor Advisory () http://secunia.com/advisories/55551 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2013/11/10/4 - () http://www.openwall.com/lists/oss-security/2013/11/10/4 -
References () http://www.securitytracker.com/id/1029317 - () http://www.securitytracker.com/id/1029317 -
References () http://www.spip.net/fr_article5646.html - () http://www.spip.net/fr_article5646.html -
References () http://www.spip.net/fr_article5648.html - () http://www.spip.net/fr_article5648.html -
References () http://zone.spip.org/trac/spip-zone/changeset/75105/_core_/securite/ecran_securite.php - Exploit, Patch () http://zone.spip.org/trac/spip-zone/changeset/75105/_core_/securite/ecran_securite.php - Exploit, Patch
References () https://www.debian.org/security/2013/dsa-2794 - () https://www.debian.org/security/2013/dsa-2794 -

Information

Published : 2013-11-18 02:55

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4557

Mitre link : CVE-2013-4557

CVE.ORG link : CVE-2013-4557


JSON object : View

Products Affected

spip

  • spip
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')