First published: Thu Nov 08 2012(Updated: )
A security flaw was found in the way Plone, a user friendly and powerful content management system, performed permissions checks for change titles of content items action. A remote attacker (anonymous user) could submit a specially-crafted HTTP POST request that, when processed, would allow them in an unauthorized way to change titles of content items. References: [1] <a href="http://plone.org/products/plone/security/advisories/20121106/16">http://plone.org/products/plone/security/advisories/20121106/16</a> [2] <a href="http://plone.org/products/plone/security/advisories/20121106/">http://plone.org/products/plone/security/advisories/20121106/</a> Relevant upstream HotFixes: [3] <a href="http://plone.org/products/plone-hotfix/releases/20121106">http://plone.org/products/plone-hotfix/releases/20121106</a> From the OSS post: [4] <a href="http://www.openwall.com/lists/oss-security/2012/11/07/4">http://www.openwall.com/lists/oss-security/2012/11/07/4</a> the renameObjectsByPaths.py change from upstream HotFix is relevant to this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Plone CMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-874649 is considered high due to its potential to allow unauthorized users to change content titles.
To fix REDHAT-BUG-874649, it is recommended to upgrade to the latest version of Plone which includes patches that address this vulnerability.
If exploited, REDHAT-BUG-874649 allows remote attackers to change titles of content items, potentially misleading users or misrepresenting content.
Any installation of Plone that is using an affected version may be vulnerable to REDHAT-BUG-874649.
A workaround for REDHAT-BUG-874649 may include restricting anonymous access to the Plone site until a patch is applied.