Directory traversal vulnerability in Plone CMS 5.x through 5.0.6 and 4.2.x through 4.3.11 allows remote administrators to read arbitrary files via a .. (dot dot) in the path parameter in a getFile action to Plone/++theme++barceloneta/@@plone.resourceeditor.filemanager-actions.
References
Link | Resource |
---|---|
https://plone.org/security/hotfix/20160830/filesystem-information-leak | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2016/09/05/5 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/09/05/4 | Mailing List Patch Third Party Advisory |
http://seclists.org/fulldisclosure/2016/Oct/80 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/92752 | |
http://www.securityfocus.com/archive/1/539572/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-03-07 08:59
Updated : 2018-10-09 13:00
NVD link : CVE-2016-7135
Mitre link : CVE-2016-7135
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
plone
- plone