CVE-2016-3154
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
08/04/2016
Last modified:
12/04/2025
Description
The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:spip:spip:2.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:spip:spip:2.0.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.debian.org/security/2016/dsa-3518
- https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr
- https://core.spip.net/projects/spip/repository/revisions/22903
- http://www.debian.org/security/2016/dsa-3518
- https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr
- https://core.spip.net/projects/spip/repository/revisions/22903



