SPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability in ecrire/public/interfaces.php, adding the function safehtml to the vulnerable fields. An editor is able to modify his personal information. If the editor has an article written and available, when a user goes to the public site and wants to read the author's information, the malicious code will be executed. The "Who are you" and "Website Name" fields are vulnerable.
References
| Link | Resource |
|---|---|
| https://git.spip.net/spip/spip/commit/d548391d799387d1e93cf1a369d385c72f7d5c81 | Patch Vendor Advisory |
| https://git.spip.net/spip/spip/commit/d548391d799387d1e93cf1a369d385c72f7d5c81 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2022-01-26 12:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44120
Mitre link : CVE-2021-44120
CVE.ORG link : CVE-2021-44120
JSON object : View
Products Affected
spip
- spip
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
