CVE-2023-52322

NameCVE-2023-52322
Descriptionecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3761-1
Debian Bugs1059331

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
spip (PTS)jessie, jessie (lts)3.0.17-2+deb8u5vulnerable
stretch (security), stretch (lts), stretch3.1.4-4~deb9u5vulnerable
buster (security), buster, buster (lts)3.2.4-1+deb10u13fixed
bullseye3.2.11-3+deb11u10fixed
bullseye (security)3.2.11-3+deb11u7vulnerable
sid, trixie4.3.3+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
spipsourcejessie(unfixed)end-of-life
spipsourcestretch(unfixed)end-of-life
spipsourcebuster3.2.4-1+deb10u13DLA-3761-1
spipsourcebullseye3.2.11-3+deb11u10
spipsourcebookworm4.1.9+dfsg-1+deb12u4
spipsource(unstable)4.1.13+dfsg-11059331

Notes

https://blog.spip.net/Mise-a-jour-de-maintenance-et-securite-sortie-de-SPIP-4-2-7-SPIP-4-1-13.html?lang=fr
https://git.spip.net/spip/spip/commit/e90f5344b8c82711053053e778d38a35e42b7bcb

Search for package or bug name: Reporting problems