SPIP 3.1.x before 3.1.6 and 3.2.x before Beta 3 does not remove shell metacharacters from the host field, allowing a remote attacker to cause remote code execution.
References
| Link | Resource |
|---|---|
| http://www.debian.org/security/2017/dsa-3890 | |
| https://contrib.spip.net/CRITICAL-security-update-SPIP-3-1-6-and-SPIP-3-2-Beta | Vendor Advisory |
| https://core.spip.net/projects/spip/repository/revisions/23593 | Patch Vendor Advisory |
| https://core.spip.net/projects/spip/repository/revisions/23594 | Patch Vendor Advisory |
| http://www.debian.org/security/2017/dsa-3890 | |
| https://contrib.spip.net/CRITICAL-security-update-SPIP-3-1-6-and-SPIP-3-2-Beta | Vendor Advisory |
| https://core.spip.net/projects/spip/repository/revisions/23593 | Patch Vendor Advisory |
| https://core.spip.net/projects/spip/repository/revisions/23594 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.debian.org/security/2017/dsa-3890 - | |
| References | () https://contrib.spip.net/CRITICAL-security-update-SPIP-3-1-6-and-SPIP-3-2-Beta - Vendor Advisory | |
| References | () https://core.spip.net/projects/spip/repository/revisions/23593 - Patch, Vendor Advisory | |
| References | () https://core.spip.net/projects/spip/repository/revisions/23594 - Patch, Vendor Advisory |
Information
Published : 2017-06-17 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-9736
Mitre link : CVE-2017-9736
CVE.ORG link : CVE-2017-9736
JSON object : View
Products Affected
spip
- spip
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
