#VU21410 Improper access control in SPIP


Published: 2019-09-29

Vulnerability identifier: #VU21410

Vulnerability risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-16391

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SPIP
Web applications / CMS

Vendor: spip.net

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php scripts. A remote authenticated website visitor can bypass implemented security restrictions and modify any published content and execute other modifications in the database

Mitigation
Install updates from vendor's website.

Vulnerable software versions

SPIP: 3.1.0 - 3.1.10, 3.2.0 - 3.2.4


External links
http://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-2-5-et-SPIP-3-1-11.html
http://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-2-5-et-SPIP-3-1-11.html?lang=fr
http://git.spip.net/SPIP/spip/commit/187952ce85e73b52c2753f2d54fc2c44807b8f79
http://git.spip.net/SPIP/spip/commit/3cbc758400323ab006c00ea78eacdb8f76aa5f66
http://seclists.org/bugtraq/2019/Sep/40


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability