First published: Mon Jul 04 2011(Updated: )
It was reported [1] that Plone suffers from a vulnerability that can be exploited to bypass certain security restrictions. This is due to a vulnerable bundled version of Zope. Plone 3.x users that backported the fix for <a href="https://access.redhat.com/security/cve/CVE-2011-0720">CVE-2011-0720</a> (PloneHotfix20110720) are affected due to the vulnerability being inadvertently backported via the hotfix. A new hotfix (20110622) is available [2] to correct the flaw. [1] <a href="http://plone.org/products/plone/security/advisories/20110622">http://plone.org/products/plone/security/advisories/20110622</a> [2] <a href="http://plone.org/products/plone-hotfix/releases/20110622">http://plone.org/products/plone-hotfix/releases/20110622</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Plone CMS | >=3.x | |
Zope ZODB |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-718824 is categorized as high due to the potential for unauthorized access and security restrictions being bypassed.
To fix REDHAT-BUG-718824, users should upgrade to a version of Plone that no longer uses the vulnerable bundled version of Zope.
REDHAT-BUG-718824 affects users of Plone 3.x who have not applied the necessary security fixes.
The security risks associated with REDHAT-BUG-718824 include potential unauthorized actions that bypass normal security controls in Plone.
Yes, REDHAT-BUG-718824 is related to CVE-2011-0720, as it stems from vulnerabilities in a bundled version of Zope that affects Plone.