GHSA-8w54-22w9-3g8f – products-cmfplone
Package
Manager: pip
Name: products-cmfplone
Vulnerable Version: =4.0b1 || =4.1 || =4.1.1 || =4.1.2 || =4.1.3 || =4.1.4 || =4.1.5 || =4.1.6 || =4.1a1 || =4.1a2 || =4.1a3 || =4.1b1 || =4.1b2 || =4.1rc2 || =4.1rc3 || =4.2 || =4.2.0.1 || =4.2.1 || =4.2.1.1 || =4.2.2 || =4.2.3 || =4.2.4 || =4.2.5 || =4.2.6 || =4.2.7 || =4.2a1 || =4.2a2 || =4.2b1 || =4.2b2 || =4.2rc1 || =4.2rc2 || =4.3 || =4.3.1 || =4.3.10 || =4.3.10rc1 || =4.3.11 || =4.3.12 || =4.3.13 || =4.3.14 || =4.3.15 || =4.3.16 || =4.3.17 || =4.3.18 || =4.3.19 || =4.3.19rc1 || =4.3.2 || =4.3.20 || =4.3.20rc1 || =4.3.3 || =4.3.4 || =4.3.4.1 || =4.3.5 || =4.3.6 || =4.3.7 || =4.3.8 || =4.3.8rc1 || =4.3.9 || =4.3a1 || =4.3a2 || =4.3b1 || =4.3b2 || =4.3rc1 || =5.0a1 || =5.0a2 || =5.0a3 || =5.0b1 || =5.0b1.post1 || =5.0b2 || =5.0b3 || =5.0b4 || =5.0rc1 || =5.0rc2 || =5.0rc3 || >=0 <5.0.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
Cross-site Scripting and Open Redirect in Products.CMFPlone ### Impact Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Usually only anonymous users are affected, but this depends on your cache settings. ### Patches No patch is available for the Products.CMFPlone 4 series. Versions 5.0 and higher are not affected, but two other packages used by these versions are affected. `plone.app.contenttypes` has the same problem in all versions, see [advisory](https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x). In Plone 5.0-5.2, the default Products.ATContentTypes version has the same problem. See [advisory](https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh). Plone 5.2.7 and 6.0.0a3 will be released today and will include these fixes. For all unpatched versions of the three packages, you can use the following workaround. ### Workaround Make sure the image_view_fullscreen page is not stored in the cache. In Plone: * Login as Manager and go to Site Setup. * Go to the 'Caching' control panel. If this does not exist, or 'Enable caching' is not checked, you should normally not be vulnerable. * Click on the tab 'Caching operations'. * Under 'Legacy template mappings' locate the ruleset 'Content item view'. * From the last column ('Templates') remove 'image_view_fullscreen'. * Click on Save. ### Reporter This vulnerability was responsibly disclosed to the Plone Security Team by Gustav Hansen, F-Secure Consulting. Thank you! ### For more information If you have any questions or comments about this advisory, email us at [security@plone.org](mailto:security@plone.org) This is also the correct address to use when you want to report a possible vulnerability. See [our security report policy](https://plone.org/security/report).
Metadata
Created: 2022-01-28T23:10:40Z
Modified: 2024-12-05T05:44:00.752961Z
Source: https://osv-vulnerabilities
CWE IDs: ["CWE-79"]
Alternative ID: N/A
Finding: F008
Auto approve: 1