Multiple vulnerabilities in Plone



Published: 2014-09-30 | Updated: 2020-08-19
Risk Medium
Patch available YES
Number of vulnerabilities 21
CVE-ID CVE-2012-6661
CVE-2012-5500
CVE-2012-5508
CVE-2012-5490
CVE-2012-5491
CVE-2012-5492
CVE-2012-5493
CVE-2012-5494
CVE-2012-5495
CVE-2012-5497
CVE-2012-5498
CVE-2012-5499
CVE-2012-5501
CVE-2012-5502
CVE-2012-5503
CVE-2012-5504
CVE-2012-5505
CVE-2012-5506
CVE-2012-5485
CVE-2012-5487
CVE-2012-5488
CWE-ID CWE-310
CWE-352
CWE-200
CWE-79
CWE-94
CWE-264
CWE-399
CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Plone
Web applications / CMS

Vendor Plone

Security Bulletin

This security bulletin contains information about 21 vulnerabilities.

1) Cryptographic issues

EUVDB-ID: #VU41177

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-6661

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://bugs.launchpad.net/zope2/+bug/1071067
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/24
http://plone.org/products/plone-hotfix/releases/20121124


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Cross-site request forgery

EUVDB-ID: #VU41178

Risk: Medium

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2012-5500

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/16
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU41179

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5508

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zope.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://bugs.launchpad.net/zope2/+bug/1071067
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/24
http://plone.org/products/plone-hotfix/releases/20121124


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Cross-site scripting

EUVDB-ID: #VU41252

Risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2012-5490

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

Vulnerability allows a remote attacker to perform Cross-site scripting attacks.

An input validation error exists in kssdevel.py in Plone before 4.2.3 and 4.3 before beta 1. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/06
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Information disclosure

EUVDB-ID: #VU41253

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5491

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

z3c.form, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain the default form field values by leveraging knowledge of the form location and the element id.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/07
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Information disclosure

EUVDB-ID: #VU41254

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5492

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

uid_catalog.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to obtain metadata about hidden objects via a crafted URL.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/08
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Code Injection

EUVDB-ID: #VU41255

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5493

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote #AU# to execute arbitrary code.

gtbn.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain permissions to bypass the Python sandbox and execute arbitrary Python code via unspecified vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/09
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Cross-site scripting

EUVDB-ID: #VU41256

Risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2012-5494

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

Vulnerability allows a remote attacker to perform XSS attacks.

The vulnerability is caused by an input validation error in python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/10
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Code Injection

EUVDB-ID: #VU41257

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5495

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to "go_back."

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/11
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Information disclosure

EUVDB-ID: #VU41259

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5497

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

membership_tool.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to enumerate user account names via a crafted URL.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/13
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU41260

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5498

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

queryCatalog.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to bypass caching and cause a denial of service via a crafted request to a collection.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/09/7
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/14
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Resource management error

EUVDB-ID: #VU41261

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5499

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to cause a denial of service (memory consumption) via a large value, related to formatColumns.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/15
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU41262

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5501

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

at_download.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read arbitrary BLOBs (Files and Images) stored on custom content types via a crafted URL.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/17
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Cross-site scripting

EUVDB-ID: #VU41263

Risk: Low

CVSSv3.1: 1.4 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2012-5502

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

Vulnerability allows a remote attacker to perform Cross-site scripting attacks.

An input validation error exists in safe_html.py in Plone before 4.2.3 and 4.3 before beta 1. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/18
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Input validation error

EUVDB-ID: #VU41264

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5503

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

ftp.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read hidden folder contents via unspecified vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/19
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Cross-site scripting

EUVDB-ID: #VU41265

Risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2012-5504

CWE-ID: CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit availability: No

Description

Vulnerability allows a remote attacker to perform Cross-site scripting attacks.

An input validation error exists in widget_traversal.py in Plone before 4.2.3 and 4.3 before beta 1. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/20
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Information disclosure

EUVDB-ID: #VU41266

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5505

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

atat.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read private data structures via a request for a view without a name.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/21
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Resource management error

EUVDB-ID: #VU41267

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5506

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to cause a denial of service (infinite loop) via an RSS feed request for a folder the user does not have permission to access.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/22
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Code Injection

EUVDB-ID: #VU41269

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5485

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/01
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU41271

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5487

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote #AU# to execute arbitrary code.

The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/03
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Code Injection

EUVDB-ID: #VU41272

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2012-5488

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plone: 1.0 - 4.3

External links

http://rhn.redhat.com/errata/RHSA-2014-1194.html
http://www.openwall.com/lists/oss-security/2012/11/10/1
http://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
http://plone.org/products/plone/security/advisories/20121106/04
http://plone.org/products/plone-hotfix/releases/20121106


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###