CVE-2021-44122
Published: 26 January 2022
SPIP 4.0.0 is affected by a Cross Site Request Forgery (CSRF) vulnerability in ecrire/public/aiguiller.php, ecrire/public/balises.php, ecrire/balise/formulaire_.php. To exploit the vulnerability, a visitor must visit a malicious website which redirects to the SPIP website. It is also possible to combine XSS vulnerabilities in SPIP 4.0.0 to exploit it. The vulnerability allows an authenticated attacker to execute malicious code without the knowledge of the user on the website (CSRF).
Priority
Status
Package | Release | Status |
---|---|---|
spip Launchpad, Ubuntu, Debian |
impish |
Released
(3.2.11-3+deb11u3build0.21.10.1)
|
trusty |
Ignored
(end of standard support)
|
|
kinetic |
Not vulnerable
(4.0.1)
|
|
jammy |
Not vulnerable
(4.0.1)
|
|
upstream |
Released
(4.0.1, 3.2.12)
|
|
xenial |
Needed
|
|
bionic |
Released
(3.1.4-4~deb9u5build0.18.04.1)
|
|
focal |
Released
(3.2.7-1ubuntu0.1)
|
|
lunar |
Not vulnerable
(4.0.1)
|
|
mantic |
Not vulnerable
(4.0.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |