First published: Thu Sep 21 2023(Updated: )
### Impact When the `++api++` traverser is accidentally used multiple times in a url, handling it takes increasingly longer, making the server less responsive. ### Patches Patches will be released in `plone.rest` 2.0.1 and 3.0.1. Series 1.x is not affected. ### Workarounds In your frontend web server (nginx, Apache) you can redirect `/++api++/++api++` to `/++api++`.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Plone Rest | =2.0.0 | |
Plone Rest | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
When the `++api++` traverser is accidentally used multiple times in a URL, handling it takes increasingly longer, making the server less responsive.
plone.rest users can be affected if they accidentally use the `++api++` traverser multiple times in a URL.
CVE-2023-42457 has a severity rating of 7.5 (High).
For versions 2.x prior to 2.0.1 and 3.x prior to 3.0.1, upgrading to version 2.0.1 or 3.0.1 respectively is recommended.
Yes, you can find references for CVE-2023-42457 at the following links: [GitHub Advisory](https://github.com/plone/plone.rest/security/advisories/GHSA-h6rp-mprm-xgcq) and [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-42457).