First published: Thu Jan 25 2024(Updated: )
An issue in Plone Docker Official Image 5.2.13 (5221) open-source software allows for remote code execution via improper validation of input by the HOST headers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plone | =5.2.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23055 is rated as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2024-23055, you should upgrade the Plone Docker Official Image to the latest version that addresses the vulnerability.
CVE-2024-23055 affects the Plone Docker Official Image version 5.2.13.
CVE-2024-23055 is classified as a remote code execution vulnerability caused by improper validation of input.
Yes, CVE-2024-23055 can be exploited remotely due to the nature of the vulnerability in its input validation.