SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.1.4-4~deb9u5ubuntu0.1~esm2", "binary_name": "spip" } ], "priority_reason": "Risk of regression due to upstream bundling security fixes with updates. For more details, see notes." }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.2.7-1ubuntu0.1+esm2", "binary_name": "spip" } ], "priority_reason": "Risk of regression due to upstream bundling security fixes with updates. For more details, see notes." }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.3.1+dfsg-1ubuntu0.1", "binary_name": "spip" } ], "priority_reason": "Risk of regression due to upstream bundling security fixes with updates. For more details, see notes." }