Headline
Debian Security Advisory 5367-1
Debian Linux Security Advisory 5367-1 - It was discovered that SPIP, a website engine for publishing, would allow a malicious user to execute arbitrary code.
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5367-1 [email protected]://www.debian.org/security/ Sebastien DelafondMarch 02, 2023 https://www.debian.org/security/faq- -------------------------------------------------------------------------Package : spipCVE ID : CVE-2023-27372It was discovered that SPIP, a website engine for publishing, wouldallow a malicious user to execute arbitrary code.For the stable distribution (bullseye), this problem has been fixed inversion 3.2.11-3+deb11u7.We recommend that you upgrade your spip packages.For the detailed security status of spip please refer toits security tracker page at:https://security-tracker.debian.org/tracker/spipFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmQAP4QACgkQEL6Jg/PVnWSHawgAm8iQlTcFT98cMImGBx8XTO70YPcgzIMK87mvmQn3NR30/dM9icfBVVu3l9Ks2mPa0yYIT0DTeXghTclf8hnJtOM2T4buRPD6po6ZyEgX5AlwN6xaZPAkYxiz+7GXiqYZAHAMShIZhhMr1CcIDsE093TC8dLdZFosSVtI7sylxTgbSlJl1xafhe6/6fhI2DcDr4ov7MrkfcjCT2BY9um/pH/L2lIKTDcHahgoxGf9wcurANtwHwHQsBNR3R5nxScH/1wTI53am6rPCYFuLGlGEcY6c2HyJPR3j3o+sUFYca+4fGNbmwuS8fOhhOgz19DTow374IwJU1qnoZjvrbB58g=ÌjC-----END PGP SIGNATURE-----
Related news
SPIP 4.2.1 Remote Code Execution
SPIP versions 4.2.1 and below suffer from an unauthenticated remote code execution vulnerability.
CVE-2023-27372: Mise à jour critique de sécurité : sortie de SPIP 4.2.1, SPIP 4.1.8, SPIP 4.0.10 et SPIP 3.2.18 – SPIP Blog
SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.