First published: Thu Nov 08 2012(Updated: )
A denial of service flaw was found in the way Plone, a user friendly and powerful content management system, performed processing of requests for certain collections. A remote attacker could provide a specially-crafted URL that, when processed would lead to excessive I/O and / or cache resources consumption. References: [1] <a href="http://plone.org/products/plone/security/advisories/20121106/14">http://plone.org/products/plone/security/advisories/20121106/14</a> [2] <a href="http://plone.org/products/plone/security/advisories/20121106/">http://plone.org/products/plone/security/advisories/20121106/</a> Relevant upstream HotFixes: [3] <a href="http://plone.org/products/plone-hotfix/releases/20121106">http://plone.org/products/plone-hotfix/releases/20121106</a> From the OSS post: [4] <a href="http://www.openwall.com/lists/oss-security/2012/11/07/4">http://www.openwall.com/lists/oss-security/2012/11/07/4</a> the queryCatalog.py change from upstream HotFix is relevant to this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Plone CMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-874665 is classified as a denial of service vulnerability which can impact system availability.
Fixing REDHAT-BUG-874665 involves applying the latest patches and updates provided for Plone.
Any installation of the Plone content management system that processes requests for certain collections is affected by REDHAT-BUG-874665.
Yes, REDHAT-BUG-874665 can be exploited remotely by sending specially-crafted URLs to the affected system.
Systems using Plone CMS are specifically impacted by REDHAT-BUG-874665 due to their request processing method.