First published: Tue Mar 07 2017(Updated: )
Directory traversal vulnerability in Plone CMS 5.x through 5.0.6 and 4.2.x through 4.3.11 allows remote administrators to read arbitrary files via a .. (dot dot) in the path parameter in a getFile action to Plone/++theme++barceloneta/@@plone.resourceeditor.filemanager-actions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Plone | >=4.2<4.3.12 | 4.3.12 |
pip/Plone | >=5.0<5.0.7 | 5.0.7 |
Plone CMS | =4.2 | |
Plone CMS | =4.2.1 | |
Plone CMS | =4.2.2 | |
Plone CMS | =4.2.3 | |
Plone CMS | =4.2.4 | |
Plone CMS | =4.2.5 | |
Plone CMS | =4.2.6 | |
Plone CMS | =4.2.7 | |
Plone CMS | =4.3 | |
Plone CMS | =4.3.1 | |
Plone CMS | =4.3.2 | |
Plone CMS | =4.3.3 | |
Plone CMS | =4.3.4 | |
Plone CMS | =4.3.5 | |
Plone CMS | =4.3.6 | |
Plone CMS | =4.3.7 | |
Plone CMS | =4.3.8 | |
Plone CMS | =4.3.9 | |
Plone CMS | =4.3.10 | |
Plone CMS | =4.3.11 | |
Plone CMS | =5.0 | |
Plone CMS | =5.0-a1 | |
Plone CMS | =5.0-rc1 | |
Plone CMS | =5.0-rc2 | |
Plone CMS | =5.0-rc3 | |
Plone CMS | =5.0.1 | |
Plone CMS | =5.0.2 | |
Plone CMS | =5.0.3 | |
Plone CMS | =5.0.4 | |
Plone CMS | =5.0.5 | |
Plone CMS | =5.0.6 | |
Plone CMS | =5.1a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7135 is classified as a medium severity vulnerability due to its potential to allow unauthorized file access.
To fix CVE-2016-7135, upgrade Plone CMS to version 4.3.12 or later for 4.3.x series or version 5.0.7 for 5.0.x series.
CVE-2016-7135 affects Plone CMS versions 4.2 through 4.3.11 and 5.0 through 5.0.6.
Yes, CVE-2016-7135 could potentially lead to data breaches by allowing attackers to read arbitrary files.
Yes, patches are available by upgrading to the latest versions of Plone CMS as mentioned in the remediation guidance.