CVE-2016-9998

Published: 17 December 2016

SPIP 3.1.x suffer from a Reflected Cross Site Scripting Vulnerability in /ecrire/exec/info_plugin.php involving the `$plugin` parameter, as demonstrated by a /ecrire/?exec=info_plugin URL.

Priority

Medium

CVSS 3 base score: 6.1

Status

Package Release Status
spip
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Not vulnerable
(3.1.4-2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(3.1.4-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(3.1.4-2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(3.1.4-2)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)