Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-44120

Опубликовано: 26 янв. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.5
CVSS3: 5.4

Описание

SPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability in ecrire/public/interfaces.php, adding the function safehtml to the vulnerable fields. An editor is able to modify his personal information. If the editor has an article written and available, when a user goes to the public site and wants to read the author's information, the malicious code will be executed. The "Who are you" and "Website Name" fields are vulnerable.

РелизСтатусПримечание
bionic

released

3.1.4-4~deb9u5build0.18.04.1
devel

not-affected

4.0.1
esm-apps/bionic

released

3.1.4-4~deb9u5build0.18.04.1
esm-apps/focal

released

3.2.7-1ubuntu0.1
esm-apps/jammy

not-affected

4.0.1
esm-apps/noble

not-affected

4.0.1
esm-apps/xenial

needed

focal

released

3.2.7-1ubuntu0.1
impish

released

3.2.11-3+deb11u3build0.21.10.1
jammy

not-affected

4.0.1

Показывать по

EPSS

Процентиль: 69%
0.00607
Низкий

3.5 Low

CVSS2

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
nvd
около 4 лет назад

SPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability in ecrire/public/interfaces.php, adding the function safehtml to the vulnerable fields. An editor is able to modify his personal information. If the editor has an article written and available, when a user goes to the public site and wants to read the author's information, the malicious code will be executed. The "Who are you" and "Website Name" fields are vulnerable.

CVSS3: 5.4
debian
около 4 лет назад

SPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability i ...

github
около 4 лет назад

SPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability in ecrire/public/interfaces.php, adding the function safehtml to the vulnerable fields. An editor is able to modify his personal information. If the editor has an article written and available, when a user goes to the public site and wants to read the author's information, the malicious code will be executed. The "Who are you" and "Website Name" fields are vulnerable.

EPSS

Процентиль: 69%
0.00607
Низкий

3.5 Low

CVSS2

5.4 Medium

CVSS3