CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.9%
SPIP before 4.2.1 allows Remote Code Execution via form values in the
public area because serialization is mishandled. The fixed versions are
3.2.18, 4.0.10, 4.1.8, and 4.2.1.
blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-2-1-SPIP-4-1-8-SPIP-4-0-10-et.html
blog.spip.net/Mise-a-jour-sortie-de-SPIP-4-2-2-SPIP-4-1-9-SPIP-4-0-11-et-SPIP-3-2-19.html (regression update)
git.spip.net/spip/spip/commit/5aedf49b89415a4df3eb775eee3801a2b4b88266
git.spip.net/spip/spip/commit/5aedf49b89415a4df3eb775eee3801a2b4b88266 (v3.2.18)
git.spip.net/spip/spip/commit/96fbeb38711c6706e62457f2b732a652a04a409d
git.spip.net/spip/spip/commit/96fbeb38711c6706e62457f2b732a652a04a409d (master)
git.spip.net/spip/svp/commit/d463bc549b13bc45651051f83760e8ce274c98d9 (SVP, regression fix)
launchpad.net/bugs/cve/CVE-2023-27372
nvd.nist.gov/vuln/detail/CVE-2023-27372
security-tracker.debian.org/tracker/CVE-2023-27372
www.cve.org/CVERecord?id=CVE-2023-27372