First published: Sat Dec 17 2016(Updated: )
SPIP 3.1.x suffer from a Reflected Cross Site Scripting Vulnerability in /ecrire/exec/info_plugin.php involving the `$plugin` parameter, as demonstrated by a /ecrire/?exec=info_plugin URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Spip | =3.1.0 | |
Spip | =3.1.0-alpha | |
Spip | =3.1.0-beta | |
Spip | =3.1.0-rc | |
Spip | =3.1.0-rc2 | |
Spip | =3.1.0-rc3 | |
Spip | =3.1.1 | |
Spip | =3.1.2 | |
Spip | =3.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9998 has a medium severity rating due to its potential for reflected cross-site scripting attacks.
To fix CVE-2016-9998, upgrade SPIP to version 3.1.4 or later where the vulnerability is patched.
CVE-2016-9998 affects SPIP versions 3.1.0 through 3.1.3, including alpha, beta, and release candidate versions.
CVE-2016-9998 is a reflected cross-site scripting vulnerability affecting the `$plugin` parameter.
Yes, CVE-2016-9998 can lead to data exposure through malicious scripts executed in users' browsers.