SB2013111803 - Multiple vulnerabilities in spip.net SPIP
Published: November 18, 2013 Updated: February 14, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2013-7303)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in (1) squelettes-dist/formulaires/inscription.php and (2) prive/forms/editer_auteur.php in SPIP before 2.1.25 and 3.0.x before 3.0.13 when processing the author name field. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Cross-site scripting (CVE-ID: CVE-2013-4556)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in the author page (prive/formulaires/editer_auteur.php) in SPIP before 2.1.24 and 3.0.x before 3.0.12 when processing url_site parameter. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Code Injection (CVE-ID: CVE-2013-4557)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The Security Screen (_core_/securite/ecran_securite.php) before 1.1.8 for SPIP, as used in SPIP 3.0.x before 3.0.12, allows remote attackers to execute arbitrary PHP via the connect parameter.
Remediation
Install update from vendor's website.
References
- http://core.spip.org/projects/spip/repository/revisions/20902
- http://seclists.org/oss-sec/2014/q1/123
- http://seclists.org/oss-sec/2014/q1/128
- http://secunia.com/advisories/56381
- http://www.securitytracker.com/id/1029703
- http://www.spip.net/fr_article5648.html
- http://www.spip.net/fr_article5665.html
- http://zone.spip.org/trac/spip-zone/changeset/77768
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90643
- http://core.spip.org/projects/spip/repository/revisions/20879
- http://core.spip.org/projects/spip/repository/revisions/20880
- http://secunia.com/advisories/55551
- http://www.openwall.com/lists/oss-security/2013/11/10/4
- http://www.securitytracker.com/id/1029317
- http://www.spip.net/fr_article5646.html
- https://www.debian.org/security/2013/dsa-2794
- http://zone.spip.org/trac/spip-zone/changeset/75105/_core_/securite/ecran_securite.php