The SPIP template composer/compiler in SPIP 3.1.2 and earlier allows remote authenticated users to execute arbitrary PHP code by uploading an HTML file with a crafted (1) INCLUDE or (2) INCLURE tag and then accessing it with a valider_xml action.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/10/05/17 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/07/5 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/08/6 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/93451 | Third Party Advisory VDB Entry |
https://core.spip.net/projects/spip/repository/revisions/23186 | Issue Tracking Vendor Advisory Patch |
https://core.spip.net/projects/spip/repository/revisions/23189 | Issue Tracking Patch Vendor Advisory |
https://core.spip.net/projects/spip/repository/revisions/23192 | Issue Tracking Patch Vendor Advisory |
https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-template-compiler-composer-php-code-execution-cve-2016-7998/ |
Configurations
History
No history.
Information
Published : 2017-01-18 17:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-7998
Mitre link : CVE-2016-7998
CVE.ORG link : CVE-2016-7998
JSON object : View
Products Affected
spip
- spip
CWE
CWE-20
Improper Input Validation