Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5487

Опубликовано: 30 сент. 2014
Источник: debian

Описание

The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zope2.12unfixedpackage

Примечания

  • Non-issue, see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692899#20

Связанные уязвимости

redhat
больше 13 лет назад

The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

nvd
больше 11 лет назад

The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVSS3: 9.9
github
больше 3 лет назад

Plone Sandbox Bypass