SPIP 3.1.x suffers from a Reflected Cross Site Scripting Vulnerability in /ecrire/exec/pucestatut.php involving the $id parameter, as demonstrated by a /ecrire/?exec=pucestatut URL.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-alpha"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-beta"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.3"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9997.json"