First published: Wed Nov 07 2007(Updated: )
Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plone Plone | =2.5 | |
Plone Plone | =2.5.1 | |
Plone Plone | =2.5.1_rc | |
Plone Plone | =2.5.4 | |
Plone Plone | =2.5_beta1 | |
Plone Plone | =3.0 | |
Plone Plone | =3.0.1 | |
Plone Plone | =3.0.2 | |
pip/plone | >=3.0<=3.0.2 | 3.0.3 |
pip/plone | >=2.5<=2.5.4 | 2.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.