CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
32.3%
SPIP 4.0.0 is affected by a Cross Site Request Forgery (CSRF) vulnerability
in ecrire/public/aiguiller.php, ecrire/public/balises.php,
ecrire/balise/formulaire_.php. To exploit the vulnerability, a visitor must
visit a malicious website which redirects to the SPIP website. It is also
possible to combine XSS vulnerabilities in SPIP 4.0.0 to exploit it. The
vulnerability allows an authenticated attacker to execute malicious code
without the knowledge of the user on the website (CSRF).
git.spip.net/spip/spip/commit/1b8e4f404c2441c15ca6540b9a6d8e50cff219db
launchpad.net/bugs/cve/CVE-2021-44122
nvd.nist.gov/vuln/detail/CVE-2021-44122
security-tracker.debian.org/tracker/CVE-2021-44122
ubuntu.com/security/notices/USN-5482-1
ubuntu.com/security/notices/USN-5482-2
www.cve.org/CVERecord?id=CVE-2021-44122
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
32.3%