Directory traversal vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to enumerate the files on the system via the var_url parameter in a valider_xml action.
References
Link | Resource |
---|---|
https://core.spip.net/projects/spip/repository/revisions/23200 | Issue Tracking Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2016/10/12/8 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/06/6 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/05/17 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/93451 | Third Party Advisory VDB Entry |
https://sysdream.com/news/lab/2016-10-19-spip-3-1-1-3-1-2-file-enumeration-path-traversal-cve-2016-7982/ |
Configurations
Information
Published : 2017-01-18 09:59
Updated : 2017-05-23 18:29
NVD link : CVE-2016-7982
Mitre link : CVE-2016-7982
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
spip
- spip