The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.
References
Configurations
No configuration.
History
23 Aug 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-23 18:15
Updated : 2024-08-23 18:46
NVD link : CVE-2024-7954
Mitre link : CVE-2024-7954
CVE.ORG link : CVE-2024-7954
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control