|
Message-ID: <CAL8hw9Et3-hdcmJPZk7cY+Z87Ggk3+yGpbbVZgMXJbuQ9CAdrw@mail.gmail.com> Date: Tue, 17 Jan 2017 09:06:10 -0600 From: Nathan Van Gheem <nathan.van.gheem@...ne.org> To: oss-security@...ts.openwall.com Subject: CVE Request: Plone Sandbox escape vulnerability Dear oss-security List, Please provide a CVE for the following issue: Sandbox escape Accessing private content via `str.format` in through-the-web templates and scripts. See this blog post by Armin Ronacher ( http://lucumr.pocoo.org/2016/12/29/careful-with-str-format/) for the general idea. Since the `format` method was introduced in Python 2.6, this part of the hotfix is only relevant for Plone 4 and 5, not Plone 3. Credit: Plone security team, Armin Ronacher Reference: https://plone.org/security/hotfix/20170117/sandbox-escape Versions Affected: 4.3.11 and any earlier 4.x version, 5.0.6 and any earlier 5.x version Code fixes: https://pypi.python.org/pypi/Products.PloneHotfix20170117 Recommended action: Install the https://pypi.python.org/pypi/Products.PloneHotfix20170117 package. Thank you, Nathan Van Gheem Plone Security Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.