First published: Mon Sep 21 2015(Updated: )
A vulnerability was found allowing users who have access to write cookie values were able to inject headers into the response. Versions affected are all versions Plone 3. Upstream hotfix: <a href="https://plone.org/security/20150910/">https://plone.org/security/20150910/</a> CVE request: <a href="http://seclists.org/oss-sec/2015/q3/589">http://seclists.org/oss-sec/2015/q3/589</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Plone CMS | <=3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1264796 is classified as a significant security risk due to header injection capabilities.
To fix REDHAT-BUG-1264796, apply the upstream hotfix provided by Plone for all versions of Plone 3.
All versions of Plone 3 are affected by REDHAT-BUG-1264796.
REDHAT-BUG-1264796 is a header injection vulnerability that allows cookie value manipulation.
No, only users with access to write cookie values can exploit REDHAT-BUG-1264796.