Vulnerability Name: | CVE-2022-28960 (CCN-226973) | ||||||||||||
Assigned: | 2020-06-25 | ||||||||||||
Published: | 2020-06-25 | ||||||||||||
Updated: | 2022-05-26 | ||||||||||||
Summary: | A PHP injection vulnerability in Spip before v3.2.8 allows attackers to execute arbitrary PHP code via the _oups parameter at /ecrire. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-94 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-28960 Source: MISC Type: Release Notes, Vendor Advisory https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-SPIP-3-2-8-et-SPIP-3-1-13.html Source: XF Type: UNKNOWN spip-cve202228960-code-exec(226973) Source: CCN Type: SPIP GIT Repository _oups donc (aka un base64_encode ca fait pas de mal) Source: MISC Type: Patch, Third Party Advisory https://github.com/spip/SPIP/commit/0394b44774555ae8331b6e65e35065dfa0bb41e4 Source: MISC Type: Patch, Third Party Advisory https://github.com/spip/SPIP/commit/6c1650713fc948318852ace759aab8f1a84791cf Source: MISC Type: Exploit, Third Party Advisory https://thinkloveshare.com/en/hacking/rce_on_spip_and_root_me/ Source: MISC Type: Third Party Advisory https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |