Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-52322

Опубликовано: 04 янв. 2024
Источник: debian
EPSS Низкий

Описание

ecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
spipfixed4.1.13+dfsg-1package
spipfixed4.1.9+dfsg-1+deb12u4bookwormpackage
spipfixed3.2.11-3+deb11u10bullseyepackage

Примечания

  • https://blog.spip.net/Mise-a-jour-de-maintenance-et-securite-sortie-de-SPIP-4-2-7-SPIP-4-1-13.html?lang=fr

  • https://git.spip.net/spip/spip/commit/e90f5344b8c82711053053e778d38a35e42b7bcb

EPSS

Процентиль: 31%
0.0012
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 2 лет назад

ecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.

CVSS3: 6.1
nvd
около 2 лет назад

ecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.

CVSS3: 6.1
github
около 2 лет назад

ecrire/public/assembler.php in SPIP before 4.1.3 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.

EPSS

Процентиль: 31%
0.0012
Низкий