SPIP v4.1.5 and earlier was discovered to contain a SQL injection vulnerability via the _oups parameter. This vulnerability allows attackers to execute arbitrary code via a crafted POST request.
References
Configurations
History
21 Nov 2024, 07:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-1-7-SPIP-4-0-9-et-SPIP-3-2-17.html - Release Notes | |
References | () https://github.com/Abyss-W4tcher/ab4yss-wr4iteups/blob/ffa980faa9e3598d49d6fb7def4f7a67cfb5f427/SPIP%20-%20Pentest/SPIP%204.1.5/SPIP_4.1.5_AND_BEFORE_AUTH_SQLi_Abyss_Watcher.md - Exploit, Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5325 - |
Information
Published : 2023-02-27 21:15
Updated : 2024-11-21 07:47
NVD link : CVE-2023-24258
Mitre link : CVE-2023-24258
CVE.ORG link : CVE-2023-24258
JSON object : View
Products Affected
spip
- spip
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')