SPIP 4.0.0 is affected by a remote command execution vulnerability. To exploit the vulnerability, an attacker must craft a malicious picture with a double extension, upload it and then click on it to execute it.
{ "binaries": [ { "binary_name": "spip", "binary_version": "3.0.21-1ubuntu1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-44123.json"
{ "binaries": [ { "binary_name": "spip", "binary_version": "3.1.4-4~deb9u5build0.18.04.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "spip", "binary_version": "3.2.7-1ubuntu0.1" } ], "availability": "No subscription required" }