Vulnerability Details : CVE-2016-7980
Cross-site request forgery (CSRF) vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to hijack the authentication of administrators for requests that execute the XML validator on a local file via a crafted valider_xml request. NOTE: this issue can be combined with CVE-2016-7998 to execute arbitrary PHP code.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2016-7980
- cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*
Threat overview for CVE-2016-7980
Top countries where our scanners detected CVE-2016-7980
Top open port discovered on systems with this issue
80
IPs affected by CVE-2016-7980 39
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-7980!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-7980
2.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7980
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2016-7980
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7980
-
http://www.securityfocus.com/bid/93451
SPIP Multiple Security Vulnerabilities
-
https://core.spip.net/projects/spip/repository/revisions/23203
Revision 23203 - Report de r23093 : Prise en compte complete des entetes HTTP_X_FORWARDED_(FOR... - SPIP - SPIP Core (Forge de développement)Issue Tracking;Patch;Vendor Advisory
-
https://core.spip.net/projects/spip/repository/revisions/23202
Revision 23202 - Report de r23200 : - ?exec=valider_xml n'est executable que par les webmestre... - SPIP - SPIP Core (Forge de développement)Issue Tracking;Patch;Vendor Advisory
-
https://core.spip.net/projects/spip/repository/revisions/23201
Revision 23201 - Report de r23200 : - ?exec=valider_xml n'est executable que par les webmestre... - SPIP - SPIP Core (Forge de développement)Issue Tracking;Vendor Advisory;Patch
-
http://www.openwall.com/lists/oss-security/2016/10/12/6
oss-security - CVE-2016-7980: SPIP 3.1.2 Exec Code Cross-Site Request ForgeryMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/10/05/17
oss-security - SPIP vulnerabilities: request for 5 CVEMailing List;Third Party Advisory
-
https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-exec-code-cross-site-request-forgery-cve-2016-7980/
Sysdream, SPIP 3.1.2 Exec Code Cross-Site Request Forgery (CVE-2016-7980)
-
http://www.openwall.com/lists/oss-security/2016/10/06/6
oss-security - Re: SPIP vulnerabilities: request for 5 CVEMailing List;Patch;Third Party Advisory
Jump to