SPIP 3.1.x before 3.1.6 and 3.2.x before Beta 3 does not remove shell metacharacters from the host field, allowing a remote attacker to cause remote code execution.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.debian.org/security/2017/dsa-3890 | vendor advisory |
https://core.spip.net/projects/spip/repository/revisions/23593 | patch vendor advisory |
https://contrib.spip.net/CRITICAL-security-update-SPIP-3-1-6-and-SPIP-3-2-Beta | vendor advisory |
https://core.spip.net/projects/spip/repository/revisions/23594 | patch vendor advisory |