• Bug#1088800: spip: CVE-2024-53619

    From David =?iso-8859-1?Q?Pr=E9vot?=@21:1/5 to All on Thu Dec 26 17:50:01 2024
    Le Sun, Dec 01, 2024 at 05:30:43PM +0100, Moritz Mⁿhlenhoff a Θcrit :
    Source: spip
    X-Debbugs-CC: team@security.debian.org
    Severity: important
    Tags: security

    Hi,

    The following vulnerability was published for spip.

    CVE-2024-53619[0]:
    | An authenticated arbitrary file upload vulnerability in the
    | Documents module of SPIP v4.3.3 allows attackers to execute
    | arbitrary code via uploading a crafted PDF file.

    It's unclear whether this has been reported/fixed upstream, the
    only reference is: https://grimthereaperteam.medium.com/spip-4-3-3-malicious-file-upload-xss-in-pdf-526c03bb1776

    Upstream considers it invalid because the executed code is sandboxed
    with a limited scope and without access to the website context.

    They pointed me to an article considered relevant to this case. https://textslashplain.com/2024/04/10/browser-security-bugs-that-arent-javascript-in-pdf/

    Regards,

    taffit

    -----BEGIN PGP SIGNATURE-----

    iQEzBAABCAAdFiEEeHVNB7wJXHRI941mBYwc+UT2vTwFAmdth+gACgkQBYwc+UT2 vTwYSwf+ORR5CXfoGK6AgU0Dr4WCH7KQm6WCSRkmla4uElU3I/PT9yniLHNxwMAZ UNhBvaChIY6at1Oaa7fqjaEQbpUCbQ3wbVgmUuVZ2ENk+qeaZhzQpN77BnyuyTXh W5X8kH2jE7+E3nFkKkRtwkgTcumgRDCUZ69RyGRrrjkH8u0IsbWEHPKTAEMkMlMm D4JtXS7tKxnlf0RWh1wmHVDFn6JP53jXhQDFu8Uj1GstVqPpIjSklPOmgkPvJ7MU wSQDDb8qZMQaDGjDUhIASg9VARQnBgFWEaegni2Mt6ZTMojW3X3CmSFIuy0w662D ASpgzHigPmJOFvJ0BRLLvzBXgq5Xyg==
    =ALXV
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)