CVE-2023-27372

SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*
cpe:2.3:a:spip:spip:4.2.0:-:*:*:*:*:*:*
cpe:2.3:a:spip:spip:4.2.0:alpha:*:*:*:*:*:*
cpe:2.3:a:spip:spip:4.2.0:alpha2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Jun 2023, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/173044/SPIP-4.2.1-Remote-Code-Execution.html -

Information

Published : 2023-02-28 20:15

Updated : 2024-02-28 19:51


NVD link : CVE-2023-27372

Mitre link : CVE-2023-27372

CVE.ORG link : CVE-2023-27372


JSON object : View

Products Affected

debian

  • debian_linux

spip

  • spip