First published: Fri Feb 24 2017(Updated: )
Chameleon (five.pt) in Plone 5.0rc1 through 5.1a1 allows remote authenticated users to bypass Restricted Python by leveraging permissions to create or edit templates.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Plone | =5.1a1 | |
pip/Plone | >=5.0rc1<=5.0.4 | |
Plone CMS | =5.0 | |
Plone CMS | =5.0-rc1 | |
Plone CMS | =5.0-rc2 | |
Plone CMS | =5.0-rc3 | |
Plone CMS | =5.0.1 | |
Plone CMS | =5.0.2 | |
Plone CMS | =5.0.3 | |
Plone CMS | =5.0.4 | |
Plone CMS | =5.1a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4043 is classified as a medium severity vulnerability.
To remediate CVE-2016-4043, upgrade your Plone installation to version 5.0.5 or later.
CVE-2016-4043 affects remote authenticated users of Plone versions 5.0rc1 to 5.1a1.
CVE-2016-4043 allows authenticated users to bypass Restricted Python and potentially execute arbitrary code.
The affected versions of Plone for CVE-2016-4043 are 5.0rc1 through 5.1a1.