CVE-2016-3154

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object.

References

http://www.debian.org/security/2016/dsa-3518

https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr

https://core.spip.net/projects/spip/repository/revisions/22903

Details

Source: MITRE

Published: 2016-04-08

Updated: 2016-04-14

Type: CWE-94

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:spip:spip:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.7:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.8:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.9:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.10:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.11:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.12:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.13:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.14:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.15:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.16:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.17:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.18:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.19:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.20:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.21:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.0.22:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.4:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.5:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.6:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.7:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.8:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.10:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.11:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.12:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.13:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.14:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.15:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.16:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.17:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.18:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:2.1.19:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.0:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.4:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.5:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.6:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.7:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.8:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.9:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.10:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.11:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.13:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.14:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.15:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.16:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.17:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.19:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.0.20:*:*:*:*:*:*:*

cpe:2.3:a:spip:spip:3.1.0:*:*:*:*:*:*:*

Tenable Plugins

View all (1 total)

IDNameProductFamilySeverity
89972Debian DSA-3518-1 : spip - security updateNessusDebian Local Security Checks
critical