by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
4 packages
- spip
- spiped
- aespipe
- lesspipe
- @LeSuisse dismissed
SPIP < 4.4.10 Authentication Bypass via PHP Type Juggling
SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in authentication logic to bypass login verification and retrieve sensitive internal data.
References
- https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-10.html vendor-advisory patch
- https://git.spip.net/spip/spip product
- https://www.vulncheck.com/advisories/spip-sql-injection-rce-via-union-php-tags third-party-advisory
Affected products
- <4.4.10
Ignored packages (4)
pkgs.spip
A random forest model for splice prediction in genomics
-
nixos-unstable 0-unstable-2023-04-19
- nixpkgs-unstable 0-unstable-2023-04-19
- nixos-unstable-small 0-unstable-2023-04-19
-
nixos-25.11 0-unstable-2023-04-19
- nixos-25.11-small 0-unstable-2023-04-19
- nixpkgs-25.11-darwin 0-unstable-2023-04-19
pkgs.spiped
Utility for secure encrypted channels between sockets
pkgs.aespipe
AES encrypting or decrypting pipe