First published: Wed Nov 07 2007(Updated: )
Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plone Plone | =2.5 | |
Plone Plone | =2.5.1 | |
Plone Plone | =2.5.1_rc | |
Plone Plone | =2.5.4 | |
Plone Plone | =2.5_beta1 | |
Plone Plone | =3.0 | |
Plone Plone | =3.0.1 | |
Plone Plone | =3.0.2 | |
pip/plone | >=3.0<=3.0.2 | 3.0.3 |
pip/plone | >=2.5<=2.5.4 | 2.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5741 is considered a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2007-5741, upgrade Plone to version 2.5.5 or 3.0.3.
CVE-2007-5741 affects Plone versions 2.5 through 2.5.4 and 3.0 through 3.0.2.
CVE-2007-5741 can be exploited by sending crafted network data containing pickled objects to execute arbitrary Python code.
CVE-2007-5741 is a remote vulnerability, allowing attackers to exploit it over a network.