First published: Tue Sep 30 2014(Updated: )
`z3c.form`, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain the default form field values by leveraging knowledge of the form location and the element id.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Plone | >=4.3a0<4.3b1 | 4.3b1 |
pip/plone | <4.2.3 | 4.2.3 |
Plone CMS | <=4.2.2 | |
Plone CMS | =1.0 | |
Plone CMS | =1.0.1 | |
Plone CMS | =1.0.2 | |
Plone CMS | =1.0.3 | |
Plone CMS | =1.0.4 | |
Plone CMS | =1.0.5 | |
Plone CMS | =1.0.6 | |
Plone CMS | =2.0 | |
Plone CMS | =2.0.1 | |
Plone CMS | =2.0.2 | |
Plone CMS | =2.0.3 | |
Plone CMS | =2.0.4 | |
Plone CMS | =2.0.5 | |
Plone CMS | =2.1 | |
Plone CMS | =2.1.1 | |
Plone CMS | =2.1.2 | |
Plone CMS | =2.1.3 | |
Plone CMS | =2.1.4 | |
Plone CMS | =2.5 | |
Plone CMS | =2.5.1 | |
Plone CMS | =2.5.2 | |
Plone CMS | =2.5.3 | |
Plone CMS | =2.5.4 | |
Plone CMS | =2.5.5 | |
Plone CMS | =3.0 | |
Plone CMS | =3.0.1 | |
Plone CMS | =3.0.2 | |
Plone CMS | =3.0.3 | |
Plone CMS | =3.0.4 | |
Plone CMS | =3.0.5 | |
Plone CMS | =3.0.6 | |
Plone CMS | =3.1 | |
Plone CMS | =3.1.1 | |
Plone CMS | =3.1.2 | |
Plone CMS | =3.1.3 | |
Plone CMS | =3.1.4 | |
Plone CMS | =3.1.5.1 | |
Plone CMS | =3.1.6 | |
Plone CMS | =3.1.7 | |
Plone CMS | =3.2 | |
Plone CMS | =3.2.1 | |
Plone CMS | =3.2.2 | |
Plone CMS | =3.2.3 | |
Plone CMS | =3.3 | |
Plone CMS | =3.3.1 | |
Plone CMS | =3.3.2 | |
Plone CMS | =3.3.3 | |
Plone CMS | =3.3.4 | |
Plone CMS | =3.3.5 | |
Plone CMS | =4.0 | |
Plone CMS | =4.0.1 | |
Plone CMS | =4.0.2 | |
Plone CMS | =4.0.3 | |
Plone CMS | =4.0.4 | |
Plone CMS | =4.0.5 | |
Plone CMS | =4.0.6.1 | |
Plone CMS | =4.1 | |
Plone CMS | =4.1.4 | |
Plone CMS | =4.1.5 | |
Plone CMS | =4.1.6 | |
Plone CMS | =4.2 | |
Plone CMS | =4.2-a1 | |
Plone CMS | =4.2-a2 | |
Plone CMS | =4.2-b1 | |
Plone CMS | =4.2-b2 | |
Plone CMS | =4.2-rc1 | |
Plone CMS | =4.2-rc2 | |
Plone CMS | =4.2.0.1 | |
Plone CMS | =4.2.1 | |
Plone CMS | =4.2.1.1 | |
Plone CMS | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5491 is classified as a medium severity vulnerability.
To fix CVE-2012-5491, upgrade Plone to version 4.2.3 or 4.3 beta 1 and later.
CVE-2012-5491 allows remote attackers to obtain default form field values, potentially leaking sensitive data.
CVE-2012-5491 affects Plone versions before 4.2.3 and versions of 4.3 before beta 1.
There are no known workarounds for CVE-2012-5491 other than upgrading to the patched versions.