{ "schema_version": "1.4.0", "id": "GHSA-5fwq-26jx-xp73", "modified": "2022-05-17T03:57:00Z", "published": "2022-05-17T03:57:00Z", "aliases": [ "CVE-2016-3154" ], "details": "The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3154" }, { "type": "WEB", "url": "https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr" }, { "type": "WEB", "url": "https://core.spip.net/projects/spip/repository/revisions/22903" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3518" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-04-08T14:59:00Z" } }