First published: Fri May 02 2014(Updated: )
`Products/CMFPlone/CatalogTool.py` in Plone 3.3 through 4.3.2 allows remote administrators to bypass restrictions and obtain sensitive information via an unspecified search API.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Products.CMFPlone | >=3.3<4.3.3 | 4.3.3 |
pip/Plone | >=3.3b1<4.3.3 | 4.3.3 |
Plone CMS | =3.3 | |
Plone CMS | =3.3.1 | |
Plone CMS | =3.3.2 | |
Plone CMS | =3.3.3 | |
Plone CMS | =3.3.4 | |
Plone CMS | =3.3.5 | |
Plone CMS | =3.3.6 | |
Plone CMS | =4.0 | |
Plone CMS | =4.0.1 | |
Plone CMS | =4.0.2 | |
Plone CMS | =4.0.3 | |
Plone CMS | =4.0.4 | |
Plone CMS | =4.0.5 | |
Plone CMS | =4.0.7 | |
Plone CMS | =4.0.9 | |
Plone CMS | =4.1 | |
Plone CMS | =4.1.1 | |
Plone CMS | =4.1.2 | |
Plone CMS | =4.1.3 | |
Plone CMS | =4.1.4 | |
Plone CMS | =4.1.5 | |
Plone CMS | =4.1.6 | |
Plone CMS | =4.2 | |
Plone CMS | =4.2.1 | |
Plone CMS | =4.2.2 | |
Plone CMS | =4.2.3 | |
Plone CMS | =4.2.4 | |
Plone CMS | =4.2.5 | |
Plone CMS | =4.2.6 | |
Plone CMS | =4.2.7 | |
Plone CMS | =4.3 | |
Plone CMS | =4.3.1 | |
Plone CMS | =4.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7061 is classified as having a medium severity due to its potential for unauthorized information exposure.
To fix CVE-2013-7061, upgrade Plone to version 4.3.3 or higher.
CVE-2013-7061 affects Plone versions from 3.3 through 4.3.2.
CVE-2013-7061 is a vulnerability that allows remote administrators to bypass restrictions and access sensitive information.
Yes, CVE-2013-7061 can be exploited remotely by administrators with access to the vulnerable search API.