SPIP Multiple Vulnerabilities Fixed by 3.1.2 and 3.0.23


Description   (#Several cross-site scripting vulnerabilities were reported in SPIP's core.#A remote attacker could exploit them by enticing their victim into following a specially formed link in order to execute arbitrary JavaScript or HTML code.##No further information is available.#Updated, 17/11/2016:#Further information is available for these vulnerability:#- stored cross-site scripting. A remote attacker could exploit it in order to execute arbitrary JavaScript or HTML code by inciting their victim into following a specially formed link. This vulnerability, located in the message posting feature of the internal forum, stems from a lack of validation upon user-supplied links##- cross-site scripting. A remote attacker could exploit it in order to execute arbitrary JavaScript or HTML code by inciting their victim into following a specially formed link. This vulnerability is located in the private message edition feature.##An additional vulnerability, fixed by the same versions of SPIP, has been added:#- HTTP header injection. A remote attacker could exploit it in order to access sensitive information and potentially compromise a user account by redirecting their response to a malicious server. This vulnerability is located in the password recovery feature.##Proofs of concept are available.)
     
Vulnerable Products   Vulnerable Software:
SPIP (SPIP) - 3.0, 3.0.1, 3.0.10, 3.0.11, 3.0.13, ..., 3.0.7, 3.0.8, 3.0.9, 3.1.0, 3.1.1
     
Solution   Versions 3.1.2 and 3.0.23 of SPIP fix these vulnerabilities.
     
CVE  
     
References   - SPIP : C?est la rentrée pour SPIP : SPIP 3.1.2 et SPIP 3.0.23 sont disponibles
https://blog.spip.net/C-est-la-rentree-pour-SPIP-SPIP-3-1-2-et-SPIP-3-0-23-sont-disponibles.html
- oss-sec : SPIP 3.1: XSS & Host Header Injection
http://seclists.org/fulldisclosure/2016/Nov/92
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : javascript code found in URL
3.2.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2016-09-23 

 Target Type 
Server 

 Possible exploit 
Remote