#VU39623 Permissions, Privileges, and Access Controls in Plone


Published: 2017-02-24 | Updated: 2020-08-08

Vulnerability identifier: #VU39623

Vulnerability risk: Medium

CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-4043

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Plone
Web applications / CMS

Vendor: Plone

Description

The vulnerability allows a remote privileged user to manipulate data.

Chameleon (five.pt) in Plone 5.0rc1 through 5.1a1 allows remote authenticated users to bypass Restricted Python by leveraging permissions to create or edit templates.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Plone: 5.0 - 5.1a1


External links
http://www.openwall.com/lists/oss-security/2016/04/20/3
http://plone.org/security/hotfix/20160419/bypass-restricted-python


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability