SPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability in ecrire/public/interfaces.php, adding the function safehtml to the vulnerable fields. An editor is able to modify his personal information. If the editor has an article written and available, when a user goes to the public site and wants to read the author's information, the malicious code will be executed. The "Who are you" and "Website Name" fields are vulnerable.
References
Link | Resource |
---|---|
https://git.spip.net/spip/spip/commit/d548391d799387d1e93cf1a369d385c72f7d5c81 | Patch Vendor Advisory |
https://git.spip.net/spip/spip/commit/d548391d799387d1e93cf1a369d385c72f7d5c81 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.spip.net/spip/spip/commit/d548391d799387d1e93cf1a369d385c72f7d5c81 - Patch, Vendor Advisory |
Information
Published : 2022-01-26 12:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44120
Mitre link : CVE-2021-44120
CVE.ORG link : CVE-2021-44120
JSON object : View
Products Affected
spip
- spip
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')