logo

CVE-2023-36814 products-cmfcore

Package

Manager: pip
Name: products-cmfcore
Vulnerable Version: =3.0 || =3.1 || >=3.0 <3.2 || =2.1.1 || =2.1.2 || =2.1.2-beta || =2.1.3 || =2.2.0 || =2.2.0-alpha || =2.2.0-beta || =2.2.1 || =2.2.10 || =2.2.11 || =2.2.12 || =2.2.13 || =2.2.2 || =2.2.3 || =2.2.4 || =2.2.5 || =2.2.6 || =2.2.7 || =2.2.8 || =2.2.9 || =2.3.0 || =2.3.0-beta || =2.3.0-beta2 || =2.3.1 || =2.4.0 || =2.4.0b1 || =2.4.0b2 || =2.4.0b3 || =2.4.0b4 || =2.4.0b5 || =2.4.0b6 || =2.4.0b7 || =2.4.0b8 || =2.4.1 || =2.4.2 || =2.4.3 || =2.4.4 || =2.4.5 || =2.4.6 || =2.4.7 || =2.4.8 || =2.5.0 || =2.5.1 || =2.5.2 || =2.5.3 || =2.5.4 || =2.6.0 || =2.7.0 || >=0 <2.7.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00218 pctl0.44403

Details

Products.CMFCore unauthenticated denial of service and crash via unchecked use of input with Python's marshal module ### Impact The use of Python's marshal module to handle unchecked input in a public method on `PortalFolder` objects can lead to an unauthenticated denial of service and crash situation. The code in question is exposed by all portal software built on top of `Products.CMFCore`, such as Plone. All deployments are vulnerable. ### Patches The code has been fixed in `Products.CMFCore` version 3.2. ### Workarounds Users can make the affected `decodeFolderFilter` method unreachable by editing the `PortalFolder.py` module in `Products.CMFCore` by hand and then restarting Zope. Go to line 233 of `PortalFolder.py` and remove both the `@security.public` decorator for `decodeFolderFilter` as well as the method's entire docstring. This is safe because the method is not actually used by current code. ### References - Products.CMFCore security advisory [GHSA-4hpj-8rhv-9x87](https://github.com/zopefoundation/Products.CMFCore/security/advisories/GHSA-4hpj-8rhv-9x87) ### Credits Thanks go to Nicolas VERDIER from onepoint. ### For more information If you have any questions or comments about this advisory: - Open an issue in the [Products.CMFCore issue tracker](https://github.com/zopefoundation/Products.CMFCore/issues) - Email us at [security@plone.org](mailto:security@plone.org)

Metadata

Created: 2023-07-05T22:42:09Z
Modified: 2024-10-14T18:41:11.032803Z
Source: https://osv-vulnerabilities
CWE IDs: ["CWE-770"]
Alternative ID: N/A
Finding: F067
Auto approve: 1