First published: Sat Feb 04 2017(Updated: )
Cross-site scripting (XSS) vulnerability in the manage_findResult component in the search feature in Zope ZMI in Plone before 4.3.12 and 5.x before 5.0.7 allows remote attackers to inject arbitrary web script or HTML via vectors involving double quotes, as demonstrated by the `obj_ids:tokens` parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7140.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plone Plone | =2.5.5 | |
Plone Plone | =3.3 | |
Plone Plone | =3.3.1 | |
Plone Plone | =3.3.2 | |
Plone Plone | =3.3.3 | |
Plone Plone | =3.3.4 | |
Plone Plone | =3.3.5 | |
Plone Plone | =3.3.6 | |
Plone Plone | =4.0 | |
Plone Plone | =4.0.1 | |
Plone Plone | =4.0.2 | |
Plone Plone | =4.0.3 | |
Plone Plone | =4.0.4 | |
Plone Plone | =4.0.5 | |
Plone Plone | =4.0.7 | |
Plone Plone | =4.0.8 | |
Plone Plone | =4.0.9 | |
Plone Plone | =4.0.10 | |
Plone Plone | =4.1 | |
Plone Plone | =4.1.1 | |
Plone Plone | =4.1.2 | |
Plone Plone | =4.1.3 | |
Plone Plone | =4.1.4 | |
Plone Plone | =4.1.5 | |
Plone Plone | =4.1.6 | |
Plone Plone | =4.2 | |
Plone Plone | =4.2.1 | |
Plone Plone | =4.2.2 | |
Plone Plone | =4.2.3 | |
Plone Plone | =4.2.4 | |
Plone Plone | =4.2.5 | |
Plone Plone | =4.2.6 | |
Plone Plone | =4.2.7 | |
Plone Plone | =4.3 | |
Plone Plone | =4.3.1 | |
Plone Plone | =4.3.2 | |
Plone Plone | =4.3.3 | |
Plone Plone | =4.3.4 | |
Plone Plone | =4.3.5 | |
Plone Plone | =4.3.6 | |
Plone Plone | =4.3.7 | |
Plone Plone | =4.3.8 | |
Plone Plone | =4.3.9 | |
Plone Plone | =4.3.10 | |
Plone Plone | =4.3.11 | |
Plone Plone | =5.0 | |
Plone Plone | =5.0-rc1 | |
Plone Plone | =5.0-rc2 | |
Plone Plone | =5.0-rc3 | |
Plone Plone | =5.0.1 | |
Plone Plone | =5.0.2 | |
Plone Plone | =5.0.3 | |
Plone Plone | =5.0.4 | |
Plone Plone | =5.0.5 | |
Plone Plone | =5.0.6 | |
Plone Plone | =5.1-a1 | |
Plone Plone | =5.1-a2 | |
pip/plone | >=5.0<=5.0.6 | 5.0.7 |
pip/plone | >=4.0<=4.3.11 | 4.3.12 |
=2.5.5 | ||
=3.3 | ||
=3.3.1 | ||
=3.3.2 | ||
=3.3.3 | ||
=3.3.4 | ||
=3.3.5 | ||
=3.3.6 | ||
=4.0 | ||
=4.0.1 | ||
=4.0.2 | ||
=4.0.3 | ||
=4.0.4 | ||
=4.0.5 | ||
=4.0.7 | ||
=4.0.8 | ||
=4.0.9 | ||
=4.0.10 | ||
=4.1 | ||
=4.1.1 | ||
=4.1.2 | ||
=4.1.3 | ||
=4.1.4 | ||
=4.1.5 | ||
=4.1.6 | ||
=4.2 | ||
=4.2.1 | ||
=4.2.2 | ||
=4.2.3 | ||
=4.2.4 | ||
=4.2.5 | ||
=4.2.6 | ||
=4.2.7 | ||
=4.3 | ||
=4.3.1 | ||
=4.3.2 | ||
=4.3.3 | ||
=4.3.4 | ||
=4.3.5 | ||
=4.3.6 | ||
=4.3.7 | ||
=4.3.8 | ||
=4.3.9 | ||
=4.3.10 | ||
=4.3.11 | ||
=5.0 | ||
=5.0-rc1 | ||
=5.0-rc2 | ||
=5.0-rc3 | ||
=5.0.1 | ||
=5.0.2 | ||
=5.0.3 | ||
=5.0.4 | ||
=5.0.5 | ||
=5.0.6 | ||
=5.1-a1 | ||
=5.1-a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.