SPIP 3.1.x before 3.1.6 and 3.2.x before Beta 3 does not remove shell metacharacters from the host field, allowing a remote attacker to cause remote code execution.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3890 | |
https://contrib.spip.net/CRITICAL-security-update-SPIP-3-1-6-and-SPIP-3-2-Beta | Vendor Advisory |
https://core.spip.net/projects/spip/repository/revisions/23593 | Patch Vendor Advisory |
https://core.spip.net/projects/spip/repository/revisions/23594 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-06-17 16:29
Updated : 2017-11-04 01:29
NVD link : CVE-2017-9736
Mitre link : CVE-2017-9736
CVE.ORG link : CVE-2017-9736
JSON object : View
Products Affected
spip
- spip
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')