CVE-2021-44120
Published: 26 January 2022
SPIP 4.0.0 is affected by a Cross Site Scripting (XSS) vulnerability in ecrire/public/interfaces.php, adding the function safehtml to the vulnerable fields. An editor is able to modify his personal information. If the editor has an article written and available, when a user goes to the public site and wants to read the author's information, the malicious code will be executed. The "Who are you" and "Website Name" fields are vulnerable.
Priority
Status
Package | Release | Status |
---|---|---|
spip Launchpad, Ubuntu, Debian |
impish |
Released
(3.2.11-3+deb11u3build0.21.10.1)
|
trusty |
Ignored
(end of standard support)
|
|
kinetic |
Not vulnerable
(4.0.1)
|
|
jammy |
Not vulnerable
(4.0.1)
|
|
upstream |
Released
(4.0.1, 3.2.12)
|
|
xenial |
Needed
|
|
bionic |
Released
(3.1.4-4~deb9u5build0.18.04.1)
|
|
focal |
Released
(3.2.7-1ubuntu0.1)
|
|
lunar |
Not vulnerable
(4.0.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.4 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |