SPIP CMS 3.2.x < 3.2.8 Remote Code Execution

critical Web App Scanning Plugin ID 113847

Synopsis

SPIP CMS 3.2.x < 3.2.8 Remote Code Execution

Description

According to its self-reported version, the instance of SPIP CMS running on the remote web server is prior to 3.1.14 or 3.2.x prior to 3.2.8. It is, therefore, affected by multiples vulnerabilities :
- An SQL injection vulnerabilities at /ecrire via the lier_trad and where parameters
- A PHP code injection via the _oups parameter at /ecrire
- HTML Injection in the component /spip.php.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number

Solution

Update to SPIP CMS version 3.2.8 or latest.

See Also

https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-SPIP-3-2-8-et-SPIP-3-1-13.html

Plugin Details

Severity: Critical

ID: 113847

Type: remote

Published: 4/6/2023

Updated: 4/6/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-28984

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2020-28984

Vulnerability Information

CPE: cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/19/2022

Vulnerability Publication Date: 5/19/2022

Reference Information

CVE: CVE-2020-28984, CVE-2022-28959, CVE-2022-28960, CVE-2022-28961