Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 21 |
CVE-ID | CVE-2012-6661 CVE-2012-5500 CVE-2012-5508 CVE-2012-5490 CVE-2012-5491 CVE-2012-5492 CVE-2012-5493 CVE-2012-5494 CVE-2012-5495 CVE-2012-5497 CVE-2012-5498 CVE-2012-5499 CVE-2012-5501 CVE-2012-5502 CVE-2012-5503 CVE-2012-5504 CVE-2012-5505 CVE-2012-5506 CVE-2012-5485 CVE-2012-5487 CVE-2012-5488 |
CWE-ID | CWE-310 CWE-352 CWE-200 CWE-79 CWE-94 CWE-264 CWE-399 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Plone Web applications / CMS |
Vendor | Plone |
Security Bulletin
This security bulletin contains information about 21 vulnerabilities.
EUVDB-ID: #VU41177
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-6661
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://bugs.launchpad.net/zope2/+bug/1071067
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/24
http://plone.org/products/plone-hotfix/releases/20121124
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41178
Risk: Medium
CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2012-5500
CWE-ID:
CWE-352 - Cross-Site Request Forgery (CSRF)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/16
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41179
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5508
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zope.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://bugs.launchpad.net/zope2/+bug/1071067
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/24
http://plone.org/products/plone-hotfix/releases/20121124
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41252
Risk: Low
CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2012-5490
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionVulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in kssdevel.py in Plone before 4.2.3 and 4.3 before beta 1. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/06
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41253
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5491
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
z3c.form, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain the default form field values by leveraging knowledge of the form location and the element id.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/07
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41254
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5492
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
uid_catalog.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to obtain metadata about hidden objects via a crafted URL.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/08
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41255
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5493
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote #AU# to execute arbitrary code.
gtbn.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain permissions to bypass the Python sandbox and execute arbitrary Python code via unspecified vectors.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/09
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41256
Risk: Low
CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2012-5494
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionVulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/10
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41257
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5495
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to "go_back."
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/11
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41259
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5497
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
membership_tool.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to enumerate user account names via a crafted URL.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/13
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41260
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5498
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
queryCatalog.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to bypass caching and cause a denial of service via a crafted request to a collection.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/09/7
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/14
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41261
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5499
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to cause a denial of service (memory consumption) via a large value, related to formatColumns.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/15
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41262
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5501
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
at_download.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read arbitrary BLOBs (Files and Images) stored on custom content types via a crafted URL.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/17
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41263
Risk: Low
CVSSv3.1: 1.4 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2012-5502
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionVulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in safe_html.py in Plone before 4.2.3 and 4.3 before beta 1. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/18
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41264
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5503
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
ftp.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read hidden folder contents via unspecified vectors.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/19
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41265
Risk: Low
CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]
CVE-ID: CVE-2012-5504
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionVulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in widget_traversal.py in Plone before 4.2.3 and 4.3 before beta 1. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/20
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41266
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5505
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
atat.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read private data structures via a request for a view without a name.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/21
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41267
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5506
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to cause a denial of service (infinite loop) via an RSS feed request for a folder the user does not have permission to access.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/22
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41269
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5485
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/01
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41271
Risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5487
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote #AU# to execute arbitrary code.
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/03
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41272
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2012-5488
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.
MitigationInstall update from vendor's website.
Vulnerable software versionsPlone: 1.0 - 4.3
External linkshttp://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/04
http://plone.org/products/plone-hotfix/releases/20121106
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.