| Name | CVE-2022-28959 |
| Description | Multiple cross-site scripting (XSS) vulnerabilities in the component /spip.php of Spip Web Framework v3.1.13 and below allows attackers to execute arbitrary web scripts or HTML. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DSA-4798-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| spip (PTS) | bullseye | 3.2.11-3+deb11u10 | fixed |
| bullseye (security) | 3.2.11-3+deb11u7 | fixed | |
| trixie | 4.4.3+dfsg-1 | fixed | |
| forky, sid | 4.4.6+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| spip | source | buster | 3.2.4-1+deb10u3 | DSA-4798-1 | ||
| spip | source | (unstable) | 3.2.8-1 |
https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-SPIP-3-2-8-et-SPIP-3-1-13.html
https://thinkloveshare.com/en/hacking/rce_on_spip_and_root_me/
https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/
https://github.com/spip/SPIP/commit/0394b44774555ae8331b6e65e35065dfa0bb41e4 (v4.0.0)
https://github.com/spip/SPIP/commit/6c1650713fc948318852ace759aab8f1a84791cf