logo

CVE-2022-23599 products-atcontenttypes

Package

Manager: pip
Name: products-atcontenttypes
Vulnerable Version: =1.2.6 || =1.2.7 || =1.2.8 || =1.3.0 || =1.3.1 || =1.3.2 || =1.3.3 || =1.3.4 || =1.3.5 || =1.3.6 || =1.3.7 || =2.0 || =2.0.1 || =2.0.2 || =2.0.3 || =2.0.4 || =2.0.5 || =2.0.6 || =2.0.7 || =2.0a1 || =2.0a2 || =2.0a3 || =2.0a4 || =2.0a5 || =2.0a6 || =2.0b1 || =2.0b10 || =2.0b11 || =2.0b2 || =2.0b3 || =2.0b4 || =2.0b5 || =2.0b6 || =2.0b7 || =2.0b8 || =2.0b9 || =2.1.0 || =2.1.1 || =2.1.10 || =2.1.11 || =2.1.12 || =2.1.13 || =2.1.14 || =2.1.15 || =2.1.16 || =2.1.17 || =2.1.18 || =2.1.19 || =2.1.2 || =2.1.3 || =2.1.4 || =2.1.5 || =2.1.6 || =2.1.7 || =2.1.8 || =2.1.9 || =2.2.0 || =2.2.1 || =2.2.10 || =2.2.11 || =2.2.12 || =2.2.13 || =2.2.14 || =2.2.2 || =2.2.3 || =2.2.4 || =2.2.5 || =2.2.6 || =2.2.7 || =2.2.8 || =2.2.9 || =2.3 || =2.3.1 || =2.3.2 || =2.3.3 || =2.3.4 || =2.3.5 || =2.3.6 || =2.3.7 || =2.3.8 || =2.3.9 || =3.0.0 || =3.0.1 || =3.0.2 || =3.0.3 || =3.0.4 || =3.0.5 || >=0 <3.0.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00232 pctl0.45954

Details

Cross-site Scripting and Open Redirect in Products.ATContentTypes ### Impact Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Usually only anonymous users are affected, but this depends on your cache settings. ### Patches A new version 3.0.6 of Products.ATContentTypes has been released with a fix. This version works on Plone 5.2 (Python 2 only) and will be included in Plone 5.2.7. Note that the Products.CMFPlone package has the same problem in the 4.3 series. `plone.app.contenttypes` has the same problem in all versions, see [advisory](https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x). For all unpatched versions of the three packages, you can use the following workaround. ### Workaround Make sure the image_view_fullscreen page is not stored in the cache. In Plone: * Login as Manager and go to Site Setup. * Go to the 'Caching' control panel. If this does not exist, or 'Enable caching' is not checked, you should normally not be vulnerable. * Click on the tab 'Caching operations'. * Under 'Legacy template mappings' locate the ruleset 'Content item view'. * From the last column ('Templates') remove 'image_view_fullscreen'. * Click on Save. ### Reporter This vulnerability was responsibly disclosed to the Plone Security Team by Gustav Hansen, F-Secure Consulting. Thank you! ### For more information If you have any questions or comments about this advisory, email us at [security@plone.org](mailto:security@plone.org) This is also the correct address to use when you want to report a possible vulnerability. See [our security report policy](https://plone.org/security/report).

Metadata

Created: 2022-01-28T23:10:37Z
Modified: 2024-10-21T21:01:39.825264Z
Source: https://osv-vulnerabilities
CWE IDs: ["CWE-601", "CWE-79"]
Alternative ID: N/A
Finding: F008
Auto approve: 1