CVE-2017-9736

NameCVE-2017-9736
DescriptionSPIP 3.1.x before 3.1.6 and 3.2.x before Beta 3 does not remove shell metacharacters from the host field, allowing a remote attacker to cause remote code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-3890-1
NVD severityhigh
Debian Bugs864921

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
spip (PTS)stretch3.1.4-4~deb9u3fixed
stretch (security)3.1.4-4~deb9u4+deb9u1fixed
buster, buster (security)3.2.4-1+deb10u4fixed
bookworm, bullseye, sid3.2.11-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
spipsourcewheezy(not affected)
spipsourcejessie(not affected)
spipsourcestretch3.1.4-3~deb9u1DSA-3890-1
spipsource(unstable)3.1.4-3864921

Notes

[jessie] - spip <not-affected> (Vulnerable code not present)
[wheezy] - spip <not-affected> (Vulnerable code not present)
https://contrib.spip.net/CRITICAL-security-update-SPIP-3-1-6-and-SPIP-3-2-Beta
https://core.spip.net/projects/spip/repository/revisions/23593
https://core.spip.net/projects/spip/repository/revisions/23594

Search for package or bug name: Reporting problems