Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAL8hw9Et3-hdcmJPZk7cY+Z87Ggk3+yGpbbVZgMXJbuQ9CAdrw@mail.gmail.com>
Date: Tue, 17 Jan 2017 09:06:10 -0600
From: Nathan Van Gheem <nathan.van.gheem@...ne.org>
To: oss-security@...ts.openwall.com
Subject: CVE Request: Plone Sandbox escape vulnerability

Dear oss-security List,

Please provide a CVE for the following issue:

Sandbox escape
    Accessing private content via `str.format` in through-the-web templates
and scripts. See this blog post by Armin Ronacher (
http://lucumr.pocoo.org/2016/12/29/careful-with-str-format/) for the
general idea. Since the `format` method was introduced in Python 2.6, this
part of the hotfix is only relevant for Plone 4 and 5, not Plone 3.
    Credit: Plone security team, Armin Ronacher
    Reference: https://plone.org/security/hotfix/20170117/sandbox-escape


Versions Affected:
4.3.11 and any earlier 4.x version, 5.0.6 and any earlier 5.x version

Code fixes:
https://pypi.python.org/pypi/Products.PloneHotfix20170117

Recommended action:
Install the https://pypi.python.org/pypi/Products.PloneHotfix20170117
package.


Thank you,
Nathan Van Gheem
Plone Security Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.