CVE-2021-44120

NameCVE-2021-44120
DescriptionSPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability in ecrire/public/interfaces.php, adding the function safehtml to the vulnerable fields. An editor is able to modify his personal information. If the editor has an article written and available, when a user goes to the public site and wants to read the author's information, the malicious code will be executed. The "Who are you" and "Website Name" fields are vulnerable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2867-1, DSA-5028-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
spip (PTS)buster, buster (security)3.2.4-1+deb10u9fixed
bullseye (security), bullseye3.2.11-3+deb11u5fixed
bookworm, sid4.1.5+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
spipsourcestretch3.1.4-4~deb9u4+deb9u2DLA-2867-1
spipsourcebuster3.2.4-1+deb10u5DSA-5028-1
spipsourcebullseye3.2.11-3+deb11u1DSA-5028-1
spipsource(unstable)3.2.12-1

Notes

https://git.spip.net/spip/spip/commit/d548391d799387d1e93cf1a369d385c72f7d5c81
https://git.spip.net/spip/spip/commit/361cc26080d1377bc55d2cb80736e5cfaf5fd242 (v3.2.12)
https://blog.spip.net/SPIP-4-0-1_SPIP-3-1-12.html

Search for package or bug name: Reporting problems