Security bypass in Plone - CVE-2011-1950
Published: December 27, 2016
Vulnerability identifier: #VU2932
CSH Severity: Critical
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2011-1950
CWE-ID: CWE-862
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Plone
Affected software:
Plone
Plone
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to improper checking for authorization by plone.app.user. A remote attacker can modify the properties of arbitrary accounts.
Successful exploitation of the vulnerability may result in attacker's access to the vulnerable system.
Note: the vulnerability was being actively exploited.
The weakness exists due to improper checking for authorization by plone.app.user. A remote attacker can modify the properties of arbitrary accounts.
Successful exploitation of the vulnerability may result in attacker's access to the vulnerable system.
Note: the vulnerability was being actively exploited.
How to mitigate CVE-2011-1950
Update the latest version from vendor's website:
https://old.plone.org/products/plone-hotfix/releases/20110531
https://old.plone.org/products/plone-hotfix/releases/20110531