Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-8517

Опубликовано: 06 сент. 2024
Источник: debian
EPSS Критический

Описание

SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
spipfixed4.3.2+dfsg-1package
spipnot-affectedbullseyepackage

Примечания

  • https://blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-3-2-SPIP-4-2-16-SPIP-4-1-18.html?lang=fr

  • https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_2_a_big_upload/

  • Fixed by: https://git.spip.net/spip/bigup/-/commit/290b812f339ab23ff5bb83c05de160fb6275195f (bigup 3.4.0)

  • Mitigation through built-in WAF: https://git.spip.net/spip/spip/-/commit/091eba6a7969b502dbe53c58a509b4c2a650f802 (v4.1.18)

EPSS

Процентиль: 100%
0.93228
Критический

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 1 года назад

SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.

CVSS3: 9.8
nvd
больше 1 года назад

SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.

CVSS3: 9.8
github
больше 1 года назад

SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.

EPSS

Процентиль: 100%
0.93228
Критический