Vulnerability Name: | CVE-2016-7980 (CCN-118138) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-10-12 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2016-10-12 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-05-24 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | Cross-site request forgery (CSRF) vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to hijack the authentication of administrators for requests that execute the XML validator on a local file via a crafted valider_xml request. Note: this issue can be combined with CVE-2016-7998 to execute arbitrary PHP code. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-352 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-7980 Source: CCN Type: Full-Disclosure Mailing List, Wed, 12 Oct 2016 15:26:23 +0200 CVE-2016-7980: SPIP 3.1.2 Exec Code Cross-Site Request Forgery Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20161005 SPIP vulnerabilities: request for 5 CVE Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20161006 Re: SPIP vulnerabilities: request for 5 CVE Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20161012 CVE-2016-7980: SPIP 3.1.2 Exec Code Cross-Site Request Forgery Source: BID Type: UNKNOWN 93451 Source: CCN Type: BID-93451 SPIP Multiple Security Vulnerabilities Source: CCN Type: SPIP Web Site SPIP - Système de Publication pour Internet Source: CONFIRM Type: Issue Tracking, Patch, Vendor Advisory https://core.spip.net/projects/spip/repository/revisions/23201 Source: CONFIRM Type: Issue Tracking, Patch, Vendor Advisory https://core.spip.net/projects/spip/repository/revisions/23202 Source: CONFIRM Type: Issue Tracking, Patch, Vendor Advisory https://core.spip.net/projects/spip/repository/revisions/23203 Source: XF Type: UNKNOWN spip-cve20167980-csrf(118138) Source: CCN Type: Packet Storm Security [10-19-2016] SPIP 3.1.2 Cross Site Request Forgery Source: MISC Type: UNKNOWN https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-exec-code-cross-site-request-forgery-cve-2016-7980/ Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [10-20-2016] | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |