SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 07:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/171921/SPIP-Remote-Command-Execution.html - | |
References | () http://packetstormsecurity.com/files/173044/SPIP-4.2.1-Remote-Code-Execution.html - | |
References | () https://blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-2-1-SPIP-4-1-8-SPIP-4-0-10-et.html - Release Notes | |
References | () https://git.spip.net/spip/spip/commit/5aedf49b89415a4df3eb775eee3801a2b4b88266 - Patch | |
References | () https://git.spip.net/spip/spip/commit/96fbeb38711c6706e62457f2b732a652a04a409d - Patch | |
References | () https://www.debian.org/security/2023/dsa-5367 - Third Party Advisory |
21 Jun 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-02-28 20:15
Updated : 2024-11-21 07:52
NVD link : CVE-2023-27372
Mitre link : CVE-2023-27372
CVE.ORG link : CVE-2023-27372
JSON object : View
Products Affected
debian
- debian_linux
spip
- spip
CWE