7.5
CVSSv3

CVE-2016-7982

Published: 18/01/2017 Updated: 24/05/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and previous versions allows remote malicious users to enumerate the files on the system via the var_url parameter in a valider_xml action.

Vulnerable Product Search on Vulmon Subscribe to Product

spip spip

Vendor Advisories

Debian Bug report logs - #848641 spip: CVE-2016-9997 CVE-2016-9998 Package: src:spip; Maintainer for src:spip is David Prévot <taffit@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 19 Dec 2016 05:39:01 UTC Severity: important Tags: patch, security, upstream Found in version spip/313 ...
Debian Bug report logs - #847156 spip: CVE-2016-9152 Package: src:spip; Maintainer for src:spip is David Prévot <taffit@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 6 Dec 2016 06:15:01 UTC Severity: important Tags: patch, security, upstream Found in version spip/313-1 Fixed in ve ...

Exploits

## SPIP 311/312 File Enumeration / Path Traversal (CVE-2016-7982) ### Product Description SPIP is a publishing system for the Internet, which put importance on collaborative working, multilingual environments and ease of use It is free software, distributed under the GNU/GPL licence ### Vulnerability Description The `valider_xml` file can ...
SPIP versions 312 and below suffer from file enumeration and path traversal vulnerabilities ...