Access Restriction Bypass Affecting spip package, versions <2.0.9-1


Severity

Recommended
medium

Based on Debian security rating.

Threat Intelligence

EPSS
5.26% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-SPIP-305883
  • published1 Sept 2009
  • disclosed1 Sept 2009

Introduced: 1 Sep 2009

CVE-2009-3041  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Debian:unstable spip to version 2.0.9-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream spip package and not the spip package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

SPIP 1.9 before 1.9.2i and 2.0.x through 2.0.8 does not use proper access control for (1) ecrire/exec/install.php and (2) ecrire/index.php, which allows remote attackers to conduct unauthorized activities related to installation and backups, as exploited in the wild in August 2009.

CVSS Scores

version 3.1