First published: Thu Nov 08 2012(Updated: )
An information disclosure flaw was found in the way Plone, a user friendly and powerful content management system, enforced permissions check on membership database. A remote attacker could provide a specially-crafted URL that, when processed could allow the attacker to enumerate user account names. References: [1] <a href="http://plone.org/products/plone/security/advisories/20121106/13">http://plone.org/products/plone/security/advisories/20121106/13</a> [2] <a href="http://plone.org/products/plone/security/advisories/20121106/">http://plone.org/products/plone/security/advisories/20121106/</a> Relevant upstream HotFixes: [3] <a href="http://plone.org/products/plone-hotfix/releases/20121106">http://plone.org/products/plone-hotfix/releases/20121106</a> From the OSS post: [4] <a href="http://www.openwall.com/lists/oss-security/2012/11/07/4">http://www.openwall.com/lists/oss-security/2012/11/07/4</a> the membership_tool.py change from upstream HotFix is relevant to this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Plone CMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-874681 is considered high due to the potential for information disclosure.
To fix REDHAT-BUG-874681, you should apply the latest security updates and patches provided for Plone.
REDHAT-BUG-874681 affects users of the Plone content management system that have not implemented the necessary security measures.
REDHAT-BUG-874681 exploits a flaw in the permissions check on the membership database, allowing user enumeration via crafted URLs.
REDHAT-BUG-874681 can enable remote attackers to enumerate user account names, potentially leading to further attacks.