Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7999

Опубликовано: 18 янв. 2017
Источник: debian

Описание

ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to conduct server side request forgery (SSRF) attacks via a URL in the var_url parameter in a valider_xml action.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
spipfixed3.1.3-1package
spipfixed3.0.17-2+deb8u3jessiepackage

Примечания

  • http://seclists.org/fulldisclosure/2016/Oct/78

  • https://core.spip.net/projects/spip/repository/revisions/23180 (master)

  • https://core.spip.net/projects/spip/repository/revisions/23182 (3.1)

  • https://core.spip.net/projects/spip/repository/revisions/23184 (3.0)

  • reproducible in Wheezy (2.1.17-1+deb7u5) and Jessie (3.0.17-2+deb8u2)

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 9 лет назад

ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to conduct server side request forgery (SSRF) attacks via a URL in the var_url parameter in a valider_xml action.

CVSS3: 7.4
nvd
около 9 лет назад

ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to conduct server side request forgery (SSRF) attacks via a URL in the var_url parameter in a valider_xml action.

CVSS3: 7.4
github
больше 3 лет назад

ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to conduct server side request forgery (SSRF) attacks via a URL in the var_url parameter in a valider_xml action.