Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-37155
HistoryDec 14, 2022 - 12:15 a.m.

CVE-2022-37155

2022-12-1400:15:09
Debian Security Bug Tracker
security-tracker.debian.org
20
spip
remote code execution
authenticated users
arbitrary code
_oups parameter
unix

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.007

Percentile

79.9%

RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via the _oups parameter.

OSVersionArchitecturePackageVersionFilename
Debian11allspip< 3.2.11-3+deb11u5spip_3.2.11-3+deb11u5_all.deb
Debian999allspip< 4.1.5+dfsg-1spip_4.1.5+dfsg-1_all.deb
Debian13allspip< 4.1.5+dfsg-1spip_4.1.5+dfsg-1_all.deb

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.007

Percentile

79.9%

Related for DEBIANCVE:CVE-2022-37155