First published: Sat Dec 17 2016(Updated: )
SPIP 3.1.x suffers from a Reflected Cross Site Scripting Vulnerability in /ecrire/exec/puce_statut.php involving the `$id` parameter, as demonstrated by a /ecrire/?exec=puce_statut URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Spip | =3.1.0 | |
Spip | =3.1.0-alpha | |
Spip | =3.1.0-beta | |
Spip | =3.1.0-rc | |
Spip | =3.1.0-rc2 | |
Spip | =3.1.0-rc3 | |
Spip | =3.1.1 | |
Spip | =3.1.2 | |
Spip | =3.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9997 is classified as a medium severity vulnerability due to its potential for reflected cross-site scripting attacks.
To fix CVE-2016-9997, update SPIP to version 3.1.4 or later, which addresses this reflected cross-site scripting vulnerability.
CVE-2016-9997 affects SPIP versions 3.1.0, 3.1.1, 3.1.2, and 3.1.3, including their alpha, beta, and release candidate variants.
A reflected cross-site scripting vulnerability, like in CVE-2016-9997, occurs when an attacker can inject malicious scripts into web pages that are then executed by users' browsers.
Yes, CVE-2016-9997 can be exploited remotely if a user visits a specially crafted URL that leverages the vulnerability.