SPIP CMS < 4.1.16 / 4.2.x < 4.2.13 / 4.3.x < 4.3.0-alpha2 Remote Code Execution

critical Web App Scanning Plugin ID 114660

Synopsis

SPIP CMS < 4.1.16 / 4.2.x < 4.2.13 / 4.3.x < 4.3.0-alpha2 Remote Code Execution

Description

The SPIP CMS versions prior to 4.1.16 or 4.2.x prior to 4.2.13 or 4.3.x prior to 4.3.0-alpha2 are vulnerable to an unauthenticated Remote Code Execution through the 'porte_plume' plugin by sending a specially forged HTTP request.

Solution

Upgrade to SPIP CMS 4.1.16 or 4.2.13 or 4.3.0-alpha2 or latest.

See Also

https://blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-3-0-alpha2-SPIP-4-2-13-SPIP-4.html

https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_1_the_feather/

Plugin Details

Severity: Critical

ID: 114660

Type: remote

Published: 3/12/2025

Updated: 3/12/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2024-7954

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2024-7954

Vulnerability Information

CPE: cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/29/2024

Vulnerability Publication Date: 7/21/2024

Reference Information

CVE: CVE-2024-7954