Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 353590 (CVE-2011-0720) - net-zope/plone: escalation of privileges (CVE-2011-0720)
Summary: net-zope/plone: escalation of privileges (CVE-2011-0720)
Status: RESOLVED OBSOLETE
Alias: CVE-2011-0720
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://plone.org/products/plone/secur...
Whiteboard: B3? [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-02-03 07:20 UTC by Paweł Hajdan, Jr. (RETIRED)
Modified: 2013-09-03 18:23 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-02-03 07:20:05 UTC
A vulnerability in Plone 2.5 to Plone 4.0 that allows anonymous users to gain manager access to a Plone site.

This is an escalation of privileges attack that can be used by anonymous users to gain access to a Plone site's administration controls, view unpublished content, create new content and modify a site's skin.  The sandbox protecting access to the underlying system is still in place, and it does not grant access to other applications running on the same Zope instance.
Comment 1 Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-02-10 21:38:15 UTC
Upstream has released a hotfix: http://plone.org/products/plone-hotfix/releases/CVE-2011-0720/
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2011-06-24 20:01:30 UTC
CVE-2011-0720 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0720):
  Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci,
  and possibly other products, allows remote attackers to obtain
  administrative access, read or create arbitrary content, and change the site
  skin via unknown vectors.
Comment 3 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-03 18:23:09 UTC
Plone is long gone from tree.