You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This module exploits a Remote Code Execution vulnerability in the BigUp plugin of SPIP.\n The vulnerability lies in the `lister_fichiers_par_champs` function, which is triggered\n when the `bigup_retrouver_fichiers` parameter is set to any value. By exploiting the improper\n handling of multipart form data in file uploads, an attacker can inject and execute\n arbitrary PHP code on the target server.\n\n This critical vulnerability affects all versions of SPIP from 4.0 up to and including\n 4.3.1, 4.2.15, and 4.1.17. It allows unauthenticated users to execute arbitrary code\n remotely via the public interface. The vulnerability has been patched in versions\n 4.3.2, 4.2.16, and 4.1.18.",
0 commit comments