Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2021-44123
HistoryJan 26, 2022 - 12:15 p.m.

CVE-2021-44123

2022-01-2612:15:07
Debian Security Bug Tracker
security-tracker.debian.org
13
spip 4.0.0
remote command execution
vulnerability
double extension
upload
execute
attacker
malicious picture
unix

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

55.4%

SPIP 4.0.0 is affected by a remote command execution vulnerability. To exploit the vulnerability, an attacker must craft a malicious picture with a double extension, upload it and then click on it to execute it.

OSVersionArchitecturePackageVersionFilename
Debian11allspip< 3.2.11-3+deb11u1spip_3.2.11-3+deb11u1_all.deb
Debian999allspip< 3.2.12-1spip_3.2.12-1_all.deb
Debian13allspip< 3.2.12-1spip_3.2.12-1_all.deb

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

55.4%