CVE-2017-9736

NameCVE-2017-9736
DescriptionSPIP 3.1.x before 3.1.6 and 3.2.x before Beta 3 does not remove shell metacharacters from the host field, allowing a remote attacker to cause remote code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3890-1
Debian Bugs864921

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
spip (PTS)bullseye3.2.11-3+deb11u10fixed
bullseye (security)3.2.11-3+deb11u7fixed
sid, trixie4.3.3+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
spipsourcewheezy(not affected)
spipsourcejessie(not affected)
spipsourcestretch3.1.4-3~deb9u1DSA-3890-1
spipsource(unstable)3.1.4-3864921

Notes

[jessie] - spip <not-affected> (Vulnerable code not present)
[wheezy] - spip <not-affected> (Vulnerable code not present)
https://contrib.spip.net/CRITICAL-security-update-SPIP-3-1-6-and-SPIP-3-2-Beta
https://core.spip.net/projects/spip/repository/revisions/23593
https://core.spip.net/projects/spip/repository/revisions/23594

Search for package or bug name: Reporting problems