SPIP 'connect' Parameter PHP Code Injection Vulnerability

Summary
SPIP is prone to a remote PHP code-injection vulnerability.
Impact
An attacker can exploit this issue to inject and execute arbitrary PHP code in the context of the affected application. This may facilitate a compromise of the application and the underlying system other attacks are also possible. Impact Level: Application/System
Solution
Vendor updates are available.
Insight
SPIP contains a flaw that is triggered when input passed via the 'connect' parameter is not properly sanitized before being used.
Affected
SPIP versions prior to 2.0.21, 2.1.16, and 3.0.3 are vulnerable. Other version may also affected.
Detection
Tries to execute the phpinfo() function by sending a HTTP POST request.
References