Vulnerability identifier: #VU39623
Vulnerability risk: Medium
CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Plone
Web applications /
CMS
Vendor: Plone
Description
The vulnerability allows a remote privileged user to manipulate data.
Chameleon (five.pt) in Plone 5.0rc1 through 5.1a1 allows remote authenticated users to bypass Restricted Python by leveraging permissions to create or edit templates.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Plone: 5.0 - 5.1a1
External links
http://www.openwall.com/lists/oss-security/2016/04/20/3
http://plone.org/security/hotfix/20160419/bypass-restricted-python
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.