Untriaged
SPIP < 4.4.10 Authentication Bypass via PHP Type Juggling
SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in authentication logic to bypass login verification and retrieve sensitive internal data.
References
-
-
https://git.spip.net/spip/spip product
-
https://www.vulncheck.com/advisories/spip-sql-injection-rce-via-union-php-tags third-party-advisory
Affected products
SPIP
- <4.4.10
Matching in nixpkgs
pkgs.spip
A random forest model for splice prediction in genomics
-
nixos-unstable 0-unstable-2023-04-19
- nixpkgs-unstable 0-unstable-2023-04-19
- nixos-unstable-small 0-unstable-2023-04-19
-
nixos-25.11 0-unstable-2023-04-19
- nixos-25.11-small 0-unstable-2023-04-19
- nixpkgs-25.11-darwin 0-unstable-2023-04-19
pkgs.spiped
Utility for secure encrypted channels between sockets
pkgs.aespipe
AES encrypting or decrypting pipe
Package maintainers
-
@martijnvermaat Martijn Vermaat <martijn@vermaat.name>
-
@apraga Alexis Praga <alexis.praga@proton.me>
-
@thoughtpolice Austin Seipp <aseipp@pobox.com>