Package: spip
Severity: normal

Some more SPIP vulnerabilities released today, fresh with zero-day
exploits!

http://www.securityfocus.com/bid/16556

SPIP is prone to a remote command-execution vulnerability. This is due
to a lack of proper sanitization of user-supplied input.

An attacker can exploit this issue to execute arbitrary remote PHP
commands on an affected computer with the privileges of the webserver
process.

Successful exploitation could facilitate unauthorized access; other
attacks are also possible.

Version 1.8.2g and earlier are vulnerable; other versions may also be
affected.

CVE ID being requested.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686-smp
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to