CVE-2016-7981

Cross-site scripting (XSS) vulnerability in valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the var_url parameter in a valider_xml action.
References
Link Resource
http://www.openwall.com/lists/oss-security/2016/10/05/17 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/10/06/6 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/10/12/7 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/93451 Third Party Advisory VDB Entry
https://core.spip.net/projects/spip/repository/revisions/23200 Issue Tracking Patch Vendor Advisory
https://core.spip.net/projects/spip/repository/revisions/23201 Issue Tracking Patch Vendor Advisory
https://core.spip.net/projects/spip/repository/revisions/23202 Issue Tracking Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/10/05/17 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/10/06/6 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/10/12/7 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/93451 Third Party Advisory VDB Entry
https://core.spip.net/projects/spip/repository/revisions/23200 Issue Tracking Patch Vendor Advisory
https://core.spip.net/projects/spip/repository/revisions/23201 Issue Tracking Patch Vendor Advisory
https://core.spip.net/projects/spip/repository/revisions/23202 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/10/05/17 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/10/05/17 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/10/06/6 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/10/06/6 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/10/12/7 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/10/12/7 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/93451 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93451 - Third Party Advisory, VDB Entry
References () https://core.spip.net/projects/spip/repository/revisions/23200 - Issue Tracking, Patch, Vendor Advisory () https://core.spip.net/projects/spip/repository/revisions/23200 - Issue Tracking, Patch, Vendor Advisory
References () https://core.spip.net/projects/spip/repository/revisions/23201 - Issue Tracking, Patch, Vendor Advisory () https://core.spip.net/projects/spip/repository/revisions/23201 - Issue Tracking, Patch, Vendor Advisory
References () https://core.spip.net/projects/spip/repository/revisions/23202 - Issue Tracking, Patch, Vendor Advisory () https://core.spip.net/projects/spip/repository/revisions/23202 - Issue Tracking, Patch, Vendor Advisory

Information

Published : 2017-01-18 17:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7981

Mitre link : CVE-2016-7981

CVE.ORG link : CVE-2016-7981


JSON object : View

Products Affected

spip

  • spip
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')