Lucene search

K
cve[email protected]CVE-2012-5487
HistorySep 30, 2014 - 2:55 p.m.

CVE-2012-5487

2014-09-3014:55:05
CWE-264
web.nvd.nist.gov
26
cve-2012-5487
sandbox whitelisting
plone
python
remote code execution

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

66.0%

The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

Affected configurations

NVD
Node
ploneploneRange4.2.2
OR
ploneploneMatch1.0
OR
ploneploneMatch1.0.1
OR
ploneploneMatch1.0.2
OR
ploneploneMatch1.0.3
OR
ploneploneMatch1.0.4
OR
ploneploneMatch1.0.5
OR
ploneploneMatch1.0.6
OR
ploneploneMatch2.0
OR
ploneploneMatch2.0.1
OR
ploneploneMatch2.0.2
OR
ploneploneMatch2.0.3
OR
ploneploneMatch2.0.4
OR
ploneploneMatch2.0.5
OR
ploneploneMatch2.1
OR
ploneploneMatch2.1.1
OR
ploneploneMatch2.1.2
OR
ploneploneMatch2.1.3
OR
ploneploneMatch2.1.4
OR
ploneploneMatch2.5
OR
ploneploneMatch2.5.1
OR
ploneploneMatch2.5.2
OR
ploneploneMatch2.5.3
OR
ploneploneMatch2.5.4
OR
ploneploneMatch2.5.5
OR
ploneploneMatch3.0
OR
ploneploneMatch3.0.1
OR
ploneploneMatch3.0.2
OR
ploneploneMatch3.0.3
OR
ploneploneMatch3.0.4
OR
ploneploneMatch3.0.5
OR
ploneploneMatch3.0.6
OR
ploneploneMatch3.1
OR
ploneploneMatch3.1.1
OR
ploneploneMatch3.1.2
OR
ploneploneMatch3.1.3
OR
ploneploneMatch3.1.4
OR
ploneploneMatch3.1.5.1
OR
ploneploneMatch3.1.6
OR
ploneploneMatch3.1.7
OR
ploneploneMatch3.2
OR
ploneploneMatch3.2.1
OR
ploneploneMatch3.2.2
OR
ploneploneMatch3.2.3
OR
ploneploneMatch3.3
OR
ploneploneMatch3.3.1
OR
ploneploneMatch3.3.2
OR
ploneploneMatch3.3.3
OR
ploneploneMatch3.3.4
OR
ploneploneMatch3.3.5
OR
ploneploneMatch4.0
OR
ploneploneMatch4.0.1
OR
ploneploneMatch4.0.2
OR
ploneploneMatch4.0.3
OR
ploneploneMatch4.0.4
OR
ploneploneMatch4.0.5
OR
ploneploneMatch4.0.6.1
OR
ploneploneMatch4.1
OR
ploneploneMatch4.1.4
OR
ploneploneMatch4.1.5
OR
ploneploneMatch4.1.6
OR
ploneploneMatch4.2
OR
ploneploneMatch4.2a1
OR
ploneploneMatch4.2a2
OR
ploneploneMatch4.2b1
OR
ploneploneMatch4.2b2
OR
ploneploneMatch4.2rc1
OR
ploneploneMatch4.2rc2
OR
ploneploneMatch4.2.0.1
OR
ploneploneMatch4.2.1
OR
ploneploneMatch4.2.1.1
OR
ploneploneMatch4.3

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

66.0%

Related for CVE-2012-5487