The SPIP template composer/compiler in SPIP 3.1.2 and earlier allows remote authenticated users to execute arbitrary PHP code by uploading an HTML file with a crafted (1) INCLUDE or (2) INCLURE tag and then accessing it with a valider_xml action.
References
Link | Resource |
---|---|
https://core.spip.net/projects/spip/repository/revisions/23192 | Issue Tracking Patch Vendor Advisory |
https://core.spip.net/projects/spip/repository/revisions/23189 | Issue Tracking Patch Vendor Advisory |
https://core.spip.net/projects/spip/repository/revisions/23186 | Issue Tracking Vendor Advisory Patch |
http://www.openwall.com/lists/oss-security/2016/10/08/6 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/07/5 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/05/17 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/93451 | Third Party Advisory VDB Entry |
https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-template-compiler-composer-php-code-execution-cve-2016-7998/ |
Configurations
Information
Published : 2017-01-18 09:59
Updated : 2017-05-23 18:29
NVD link : CVE-2016-7998
Mitre link : CVE-2016-7998
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
spip
- spip