
Cloud Vulnerability DB
A community-led vulnerabilities database
A remote code execution (RCE) vulnerability was discovered in SPIP versions 3.1.13 through 4.1.2, identified as CVE-2022-37155. The vulnerability allows remote authenticated users with author privileges to execute arbitrary code via the '_oups' parameter (SPIP Blog, Pastebin).
The vulnerability exists in the editerliens.php file where the 'oups' parameter is not properly sanitized. The code checks for a valid base64-encoded serialized object but fails to properly validate the entire input, allowing injection of arbitrary code after the valid base64 portion. The vulnerability has a CVSS score of 8.8 (High), with attack vector being Network, attack complexity Low, and requiring low privileges (NVD, Github POC).
The vulnerability allows authenticated attackers to execute arbitrary code on the server, potentially leading to complete system compromise. Attackers could exploit this to access sensitive information, modify system files, and potentially escalate privileges (SpawnZii Blog).
The vulnerability was patched in SPIP versions 4.1.5, 4.0.8, and 3.2.16. The fix includes proper encoding of the '_oups' parameter to JSON and implementation of HTML entities encoding. Users are strongly advised to upgrade to these or later versions (SPIP Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."