First published: Tue Sep 30 2014(Updated: )
The sandbox whitelisting function (`allowmodule.py`) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Plone | >=4.3a0<4.3b1 | 4.3b1 |
pip/plone | <4.2.3 | 4.2.3 |
Plone CMS | <=4.2.2 | |
Plone CMS | =1.0 | |
Plone CMS | =1.0.1 | |
Plone CMS | =1.0.2 | |
Plone CMS | =1.0.3 | |
Plone CMS | =1.0.4 | |
Plone CMS | =1.0.5 | |
Plone CMS | =1.0.6 | |
Plone CMS | =2.0 | |
Plone CMS | =2.0.1 | |
Plone CMS | =2.0.2 | |
Plone CMS | =2.0.3 | |
Plone CMS | =2.0.4 | |
Plone CMS | =2.0.5 | |
Plone CMS | =2.1 | |
Plone CMS | =2.1.1 | |
Plone CMS | =2.1.2 | |
Plone CMS | =2.1.3 | |
Plone CMS | =2.1.4 | |
Plone CMS | =2.5 | |
Plone CMS | =2.5.1 | |
Plone CMS | =2.5.2 | |
Plone CMS | =2.5.3 | |
Plone CMS | =2.5.4 | |
Plone CMS | =2.5.5 | |
Plone CMS | =3.0 | |
Plone CMS | =3.0.1 | |
Plone CMS | =3.0.2 | |
Plone CMS | =3.0.3 | |
Plone CMS | =3.0.4 | |
Plone CMS | =3.0.5 | |
Plone CMS | =3.0.6 | |
Plone CMS | =3.1 | |
Plone CMS | =3.1.1 | |
Plone CMS | =3.1.2 | |
Plone CMS | =3.1.3 | |
Plone CMS | =3.1.4 | |
Plone CMS | =3.1.5.1 | |
Plone CMS | =3.1.6 | |
Plone CMS | =3.1.7 | |
Plone CMS | =3.2 | |
Plone CMS | =3.2.1 | |
Plone CMS | =3.2.2 | |
Plone CMS | =3.2.3 | |
Plone CMS | =3.3 | |
Plone CMS | =3.3.1 | |
Plone CMS | =3.3.2 | |
Plone CMS | =3.3.3 | |
Plone CMS | =3.3.4 | |
Plone CMS | =3.3.5 | |
Plone CMS | =4.0 | |
Plone CMS | =4.0.1 | |
Plone CMS | =4.0.2 | |
Plone CMS | =4.0.3 | |
Plone CMS | =4.0.4 | |
Plone CMS | =4.0.5 | |
Plone CMS | =4.0.6.1 | |
Plone CMS | =4.1 | |
Plone CMS | =4.1.4 | |
Plone CMS | =4.1.5 | |
Plone CMS | =4.1.6 | |
Plone CMS | =4.2 | |
Plone CMS | =4.2-a1 | |
Plone CMS | =4.2-a2 | |
Plone CMS | =4.2-b1 | |
Plone CMS | =4.2-b2 | |
Plone CMS | =4.2-rc1 | |
Plone CMS | =4.2-rc2 | |
Plone CMS | =4.2.0.1 | |
Plone CMS | =4.2.1 | |
Plone CMS | =4.2.1.1 | |
Plone CMS | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5487 is classified as critical because it allows authenticated users to execute arbitrary Python code due to improper sandbox restrictions.
To fix CVE-2012-5487, upgrade to Plone version 4.2.3 or later.
CVE-2012-5487 affects Plone versions prior to 4.2.3 and all versions from 1.0 to 4.1.
Users with certain authenticated privileges on vulnerable versions of Plone can exploit CVE-2012-5487.
CVE-2012-5487 allows attackers to bypass Python sandbox restrictions and execute arbitrary Python code.