Security bypass in Plone - CVE-2011-1950

 

Security bypass in Plone - CVE-2011-1950

Published: December 27, 2016


Vulnerability identifier: #VU2932
CSH Severity: Critical
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2011-1950
CWE-ID: CWE-862
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Plone
Affected software:
Plone

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper checking for authorization by plone.app.user. A remote attacker can modify the properties of arbitrary accounts.

Successful exploitation of the vulnerability may result in attacker's access to the vulnerable system.

Note: the vulnerability was being actively exploited.

How to mitigate CVE-2011-1950

Update the latest version from vendor's website:
https://old.plone.org/products/plone-hotfix/releases/20110531

Sources