#VU39576 Path traversal in Plone - CVE-2016-7135
Published: March 7, 2017 / Updated: August 19, 2020
Plone
Plone
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in Plone CMS 5.x through 5.0.6 and 4.2.x through 4.3.11. A remote authenticated attacker can send a specially crafted HTTP request and remote administrators to read arbitrary files via a . (dot dot) in the path parameter in a getFile action to Plone/++theme++barceloneta/@@plone.resourceeditor.filemanager-actions.
Remediation
External links
- http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html
- http://seclists.org/fulldisclosure/2016/Oct/80
- http://www.openwall.com/lists/oss-security/2016/09/05/4
- http://www.openwall.com/lists/oss-security/2016/09/05/5
- http://www.securityfocus.com/archive/1/539572/100/0/threaded
- http://www.securityfocus.com/bid/92752
- https://plone.org/security/hotfix/20160830/filesystem-information-leak