SB2020092421 - Ubuntu update for spip



SB2020092421 - Ubuntu update for spip

Published: September 24, 2020 Updated: April 23, 2025

Security Bulletin ID SB2020092421
Severity
Medium
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 57% Low 43%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Cross-site scripting (CVE-ID: CVE-2019-16392)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in prive/formulaires/login.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


2) Information disclosure (CVE-ID: CVE-2019-16394)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to SPIP returns different responses for existing and non-existing email addresses in an error messages from the password-reminder page. A remote attacker can brute-force the password reminder functionality and exfiltrate email addresses of existing web application users.


3) Improper Authorization (CVE-ID: CVE-2019-11071)

The vulnerability allows a remote attacker to bypass authorization checks.

The vulnerability exists due to application allows injection of HTML characters based on presence of "var_memotri" HTTP parameter in request. A remote authenticated visitor can bypass implemented security restrictions by adding "var_memotri" parameter to HTTP request and inject and execute arbitrary HTML and script code.


4) Improper access control (CVE-ID: CVE-2019-16391)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php scripts. A remote authenticated website visitor can bypass implemented security restrictions and modify any published content and execute other modifications in the database


5) Cross-site scripting (CVE-ID: CVE-2017-15736)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


6) Input validation error (CVE-ID: CVE-2019-19830)

The vulnerability allows a remote authenticated user to manipulate data.

_core_/plugins/medias in SPIP 3.2.x before 3.2.7 allows remote authenticated authors to inject content into the database.


7) HTTP response splitting (CVE-ID: CVE-2019-16393)

The vulnerability allows a remote attacker to perform HTTP splitting attacks.

The vulnerability exists due to software does not corrector process CRLF character sequences in ecrire/inc/headers.php script. A remote attacker can send specially crafted request containing CRLF sequence and make the application send a split HTTP response.

Successful exploitation of the vulnerability may allow an attacker perform cache poisoning attack.


Remediation

Install update from vendor's website.