The Security Screen (_core_/securite/ecran_securite.php) before 1.1.8 for SPIP, as used in SPIP 3.0.x before 3.0.12, allows remote attackers to execute arbitrary PHP via the connect parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://www.debian.org/security/2013/dsa-2794 | vendor advisory |
http://www.spip.net/fr_article5646.html | |
http://www.securitytracker.com/id/1029317 | vdb entry |
http://www.openwall.com/lists/oss-security/2013/11/10/4 | mailing list |
http://secunia.com/advisories/55551 | third party advisory vendor advisory |
http://www.spip.net/fr_article5648.html | |
http://zone.spip.org/trac/spip-zone/changeset/75105/_core_/securite/ecran_securite.php | patch exploit |