Summary
Several vulnerabilities have been found in SPIP, a website engine for publishing, resulting in cross-site request forgery on logout, cross-site scripting on author page, and PHP injection.
Solution
For the oldstable distribution (squeeze), these problems have been fixed in version 2.1.1-3squeeze7.
For the stable distribution (wheezy), these problems have been fixed in version 2.1.17-1+deb7u2.
For the testing distribution (jessie), these problems will be fixed soon.
For the unstable distribution (sid), these problems have been fixed in version 2.1.24-1.
For the experimental distribution, these problems have been fixed in version 3.0.12-1.
We recommend that you upgrade your spip packages.
Insight
SPIP is a publishing system for the Internet in which great importance is attached to collaborative working, to multilingual environments, and to simplicity of use for web authors.
Affected
spip on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-4555, CVE-2013-4556, CVE-2013-4557 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities