Vulnerability Details : CVE-2016-3154
The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object.
Products affected by CVE-2016-3154
- cpe:2.3:a:spip:spip:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:2.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:spip:spip:3.0.19:*:*:*:*:*:*:*
Threat overview for CVE-2016-3154
Top countries where our scanners detected CVE-2016-3154
Top open port discovered on systems with this issue
80
IPs affected by CVE-2016-3154 32
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-3154!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-3154
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-3154
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-3154
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-3154
-
https://core.spip.net/projects/spip/repository/revisions/22903
Revision 22903 - Report de r22872 : Fix #3680 : on change le format du contexte ajax pour pouv... - SPIP - SPIP Core (Forge de développement)
-
https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr
Mise à jour CRITIQUE de sécurité - Sortie de SPIP 3.1.1, SPIP 3.0.22 et SPIP (...) - SPIP BlogPatch;Vendor Advisory
-
http://www.debian.org/security/2016/dsa-3518
Debian -- Security Information -- DSA-3518-1 spip
Jump to