CVE-2024-7954
23.08.2024, 18:15
The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.Enginsight
Vendor | Product | Version |
---|---|---|
spip | spip | 4.2.13 < 𝑥 < 4.2.13 |
spip | spip | 4.1.16 < 𝑥 < 4.1.16 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration