First published: Fri May 02 2014(Updated: )
Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allows remote attackers to obtain the installation path via vectors related to a file object for unspecified documentation which is initialized in class scope.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Products.CMFPlone | >=3.3<4.3.3 | 4.3.3 |
pip/plone | >=3.3<=4.3.2 | 4.3.3 |
Plone CMS | =3.3 | |
Plone CMS | =3.3.1 | |
Plone CMS | =3.3.2 | |
Plone CMS | =3.3.3 | |
Plone CMS | =3.3.4 | |
Plone CMS | =3.3.5 | |
Plone CMS | =3.3.6 | |
Plone CMS | =4.0 | |
Plone CMS | =4.0.1 | |
Plone CMS | =4.0.2 | |
Plone CMS | =4.0.3 | |
Plone CMS | =4.0.4 | |
Plone CMS | =4.0.5 | |
Plone CMS | =4.0.7 | |
Plone CMS | =4.0.9 | |
Plone CMS | =4.1 | |
Plone CMS | =4.1.1 | |
Plone CMS | =4.1.2 | |
Plone CMS | =4.1.3 | |
Plone CMS | =4.1.4 | |
Plone CMS | =4.1.5 | |
Plone CMS | =4.1.6 | |
Plone CMS | =4.2 | |
Plone CMS | =4.2.1 | |
Plone CMS | =4.2.2 | |
Plone CMS | =4.2.3 | |
Plone CMS | =4.2.4 | |
Plone CMS | =4.2.5 | |
Plone CMS | =4.2.6 | |
Plone CMS | =4.2.7 | |
Plone CMS | =4.3 | |
Plone CMS | =4.3.1 | |
Plone CMS | =4.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7060 has a medium severity rating, indicating a moderate risk to affected systems.
To fix CVE-2013-7060, users should upgrade to Plone version 4.3.3 or later.
CVE-2013-7060 affects Plone versions from 3.3 to 4.3.2.
Yes, CVE-2013-7060 can allow remote attackers to gain information about the installation path, potentially leading to further exploitation.
CVE-2013-7060 is a remote vulnerability that can be exploited by attackers without needing local access.