{"id":"UBUNTU-CVE-2024-8517","details":"SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.","modified":"2026-04-07T11:54:09.581520Z","published":"2024-09-06T16:15:00Z","related":["USN-7318-1"],"upstream":["CVE-2024-8517"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-8517"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2024-8517"},{"type":"REPORT","url":"https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_2_a_big_upload/"},{"type":"REPORT","url":"https://blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-3-2-SPIP-4-2-16-SPIP-4-1-18.html"},{"type":"REPORT","url":"https://vulncheck.com/advisories/spip-upload-rce"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7318-1"}],"affected":[{"package":{"name":"spip","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/spip@3.0.21-1ubuntu1+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.0.20-1","3.0.21-1","3.0.21-1ubuntu1","3.0.21-1ubuntu1+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"spip","binary_version":"3.0.21-1ubuntu1+esm1"}],"priority_reason":"Risk of regression due to upstream bundling security fixes with updates. For more details, see notes."},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-8517.json"}},{"package":{"name":"spip","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/spip@3.1.4-4~deb9u5ubuntu0.1~esm2?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.4-4~deb9u5ubuntu0.1~esm2"}]}],"versions":["3.1.4-3","3.1.4-4~deb9u3build0.18.04.1","3.1.4-4~deb9u5build0.18.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"spip","binary_version":"3.1.4-4~deb9u5ubuntu0.1~esm2"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","priority_reason":"Risk of regression due to upstream bundling security fixes with updates. For more details, see notes."},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-8517.json"}},{"package":{"name":"spip","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/spip@3.2.7-1ubuntu0.1+esm2?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.7-1ubuntu0.1+esm2"}]}],"versions":["3.2.4-1","3.2.5-1","3.2.7-1","3.2.7-1ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"spip","binary_version":"3.2.7-1ubuntu0.1+esm2"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","priority_reason":"Risk of regression due to upstream bundling security fixes with updates. For more details, see notes."},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-8517.json"}},{"package":{"name":"spip","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/spip@4.0.4-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.2.11-3","3.2.12-1","4.0.2-1","4.0.4-1"],"ecosystem_specific":{"binaries":[{"binary_name":"spip","binary_version":"4.0.4-1"}],"priority_reason":"Risk of regression due to upstream bundling security fixes with updates. For more details, see notes."},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-8517.json"}},{"package":{"name":"spip","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/spip@4.2.9+dfsg-2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.1.11+dfsg-1","4.1.12+dfsg-1","4.1.13+dfsg-1","4.1.15+dfsg-1","4.2.9+dfsg-2"],"ecosystem_specific":{"binaries":[{"binary_name":"spip","binary_version":"4.2.9+dfsg-2"}],"priority_reason":"Risk of regression due to upstream bundling security fixes with updates. For more details, see notes."},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-8517.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}