UBUNTU-CVE-2013-2118

Source
https://ubuntu.com/security/CVE-2013-2118
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-2118.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2013-2118
Upstream
Withdrawn
2025-07-18T16:42:51Z
Published
2013-07-09T17:55:00Z
Modified
2025-07-16T07:17:06.493863Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

SPIP 3.0.x before 3.0.9, 2.1.x before 2.1.22, and 2.0.x before 2.0.23 allows remote attackers to gain privileges and "take editorial control" via vectors related to ecrire/inc/filtres.php.

References

Affected packages

Ubuntu:14.04:LTS / spip

Package

Name
spip
Purl
pkg:deb/ubuntu/spip@3.0.14-1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.14-1

Affected versions

2.*
2.1.23-1
2.1.24-1
3.*
3.0.13-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.0.14-1",
            "binary_name": "spip"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-2118.json"