SPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability in ecrire/public/interfaces.php, adding the function safehtml to the vulnerable fields. An editor is able to modify his personal information. If the editor has an article written and available, when a user goes to the public site and wants to read the author's information, the malicious code will be executed. The "Who are you" and "Website Name" fields are vulnerable.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-30976 | SPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability in ecrire/public/interfaces.php, adding the function safehtml to the vulnerable fields. An editor is able to modify his personal information. If the editor has an article written and available, when a user goes to the public site and wants to read the author's information, the malicious code will be executed. The "Who are you" and "Website Name" fields are vulnerable. |
Ubuntu USN |
USN-5482-1 | SPIP vulnerabilities |
Ubuntu USN |
USN-5482-2 | SPIP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:10:17.340Z
Reserved: 2021-11-22T00:00:00
Link: CVE-2021-44120
No data.
Status : Modified
Published: 2022-01-26T12:15:07.847
Modified: 2024-11-21T06:30:23.840
Link: CVE-2021-44120
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN