First published: Wed Nov 21 2012(Updated: )
A security flaw was found in the way Plone, a user friendly and powerful content management system, performed protection of privilege to run RestrictedPython scripts. A remote attacker could provide a specially-crafted URL that, when processed, would allow the attacker to submit and perform excessively expensive computations or (in conjuction with other attacks) to access or alter privileged information. References: [1] <a href="http://plone.org/products/plone/security/advisories/20121106/04">http://plone.org/products/plone/security/advisories/20121106/04</a> [2] <a href="http://plone.org/products/plone/security/advisories/20121106/">http://plone.org/products/plone/security/advisories/20121106/</a> Relevant upstream HotFixes: [3] <a href="http://plone.org/products/plone-hotfix/releases/20121106">http://plone.org/products/plone-hotfix/releases/20121106</a> From the OSS post: [4] <a href="http://www.openwall.com/lists/oss-security/2012/11/07/4">http://www.openwall.com/lists/oss-security/2012/11/07/4</a> the python_scripts.py createObject() change from upstream HotFix is relevant to this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Plone CMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-878945 is considered to be high due to the potential for remote code execution.
To fix REDHAT-BUG-878945, it is recommended to update Plone to the latest patched version.
Users of Plone CMS who have not applied the necessary security updates are affected by REDHAT-BUG-878945.
Yes, REDHAT-BUG-878945 can be exploited by a remote attacker using a specially-crafted URL.
The potential impacts of REDHAT-BUG-878945 include unauthorized access and execution of arbitrary code on the server.