HTTP: SPIP Command Injection Vulnerability

This signature detects attempts to exploit a known vulnerability against SPIP. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.

Affected Products

Debian debian_linux

Short Name
HTTP:CTS:SPIP-CMD-INJ
Severity
Minor
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2023-27372 Command Injection SPIP Vulnerability
Release Date
07/20/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3617
False Positive
Unknown
Vendors

Spip

Debian

Found a potential security threat?