Description
Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.
Exploits (1)
References (7)
Core 7
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/16556
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0483
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/23086
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24600
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/18676
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015602
Exploit x_refsource_misc
http://retrogod.altervista.org/spip_182g_shell_inj_xpl.html
Scores
EPSS
0.0968
EPSS Percentile
92.9%
Details
Status
published
Products (3)
spip/spip
1.8.2d
spip/spip
1.8.2e
spip/spip
1.8.2g
Published
Feb 09, 2006
Tracked Since
Feb 18, 2026