Описание
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.
It was discovered that Plone, included as a part of luci, did not properly protect the administrator interface (control panel). A remote attacker could use this flaw to inject a specially crafted Python statement or script into Plone's restricted Python sandbox that, when the administrator interface was accessed, would be executed with the privileges of that administrator user.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | conga | Affected | ||
| Red Hat Enterprise Linux 5 | conga | Fixed | RHSA-2014:1194 | 16.09.2014 |
Показывать по
Дополнительная информация
Статус:
6 Medium
CVSS2
Связанные уязвимости
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.
ELSA-2014-1194: conga security and bug fix update (MODERATE)
6 Medium
CVSS2