Description
|
|
(#A cross-site scripting vulnerability has been identified in SPIP.#A remote attacker could exploit it in order to execute arbitrary JavaScript or HTML code by enciting their victim into following a specially formed link.##This vulnerability, located in the "rac" parameter of the "ecrire/exec/plonger.php" script file, stems from a lack of validation upon user-supplied input.##Updated, 06/12/2016:#The spip packages provided by Debian Wheezy 7 and Jessie 8 are vulnerable.)
|