CVE-2016-3154

Priority
Description
The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2.x
before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote
attackers to conduct PHP object injection attacks and execute arbitrary PHP
code via a crafted serialized object.
Notes
Package
Source: spip (LP Ubuntu Debian)
Upstream:released (3.0.22-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (3.1.1-1)
Ubuntu 19.10 (Eoan Ermine):not-affected (3.1.1-1)
Ubuntu 20.04 (Focal Fossa):not-affected (3.1.1-1)
Patches:
Upstream:https://core.spip.net/projects/spip/repository/revisions/22903
More Information

Updated: 2020-04-24 03:28:08 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)