
Cloud Vulnerability DB
A community-led vulnerabilities database
SPIP 4.0.0 was affected by a remote command execution vulnerability identified as CVE-2021-44123. The vulnerability was discovered and disclosed in January 2022, affecting the SPIP content management system (NVD).
The vulnerability allowed remote command execution through crafted malicious picture files. This security flaw was one of several vulnerabilities discovered by researchers Charles Fol and Théo Gordyjan, which included Cross Site Scripting (XSS) issues that could potentially lead to code execution (Ubuntu Security).
If successfully exploited, the vulnerability could allow attackers to execute arbitrary code on the affected systems. The issue was particularly concerning as it affected multiple versions of the SPIP content management system and could lead to complete system compromise (Ubuntu Security).
The vulnerability was addressed in subsequent updates to SPIP. Ubuntu users were advised to update their systems to specific package versions: Ubuntu 21.10 users to spip version 3.2.11-3+deb11u3build0.21.10.1, and Ubuntu 20.04 users to spip version 3.2.7-1ubuntu0.1 (Ubuntu Security, Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."