SPIP 3.1.x suffer from a Reflected Cross Site Scripting Vulnerability in /ecrire/exec/info_plugin.php involving the `$plugin` parameter, as demonstrated by a /ecrire/?exec=info_plugin URL.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/95008 | third party advisory vdb entry |
https://core.spip.net/projects/spip/repository/revisions/23288 | patch vendor advisory issue tracking |
http://www.securitytracker.com/id/1037486 | vdb entry |