{"id":"CVE-2016-7999","details":"ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to conduct server side request forgery (SSRF) attacks via a URL in the var_url parameter in a valider_xml action.","modified":"2026-03-15T22:11:28.451195Z","published":"2017-01-18T17:59:01.107Z","references":[{"type":"WEB","url":"https://sysdream.com/news/lab/2016-10-19-spip-3-1-2-server-side-request-forgery-cve-2016-7999/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/10/12/10"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93451"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/10/05/17"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/10/08/6"},{"type":"FIX","url":"https://core.spip.net/projects/spip/repository/revisions/23188"},{"type":"FIX","url":"https://core.spip.net/projects/spip/repository/revisions/23193"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/10/07/5"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7999.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.1.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"}]}