ID CVE-2012-5487
Type cve
Reporter cve@mitre.org
Modified 2014-10-01T14:28:00
Description
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.
{"id": "CVE-2012-5487", "bulletinFamily": "NVD", "title": "CVE-2012-5487", "description": "The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.", "published": "2014-09-30T14:55:00", "modified": "2014-10-01T14:28:00", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5487", "reporter": "cve@mitre.org", "references": ["http://www.openwall.com/lists/oss-security/2012/11/10/1", "https://plone.org/products/plone-hotfix/releases/20121106", "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", "https://plone.org/products/plone/security/advisories/20121106/03"], "cvelist": ["CVE-2012-5487"], "type": "cve", "lastseen": "2021-02-02T05:59:56", "edition": 6, "viewCount": 2, "enchantments": {"dependencies": {"references": [], "modified": "2021-02-02T05:59:56", "rev": 2}, "score": {"value": 7.7, "vector": "NONE", "modified": "2021-02-02T05:59:56", "rev": 2}, "vulnersScore": 7.7}, "cpe": ["cpe:/a:plone:plone:3.1.5.1", "cpe:/a:plone:plone:2.5.3", "cpe:/a:plone:plone:3.3.5", "cpe:/a:plone:plone:2.0.1", "cpe:/a:plone:plone:1.0", "cpe:/a:plone:plone:3.0", "cpe:/a:plone:plone:4.0.5", "cpe:/a:plone:plone:1.0.1", "cpe:/a:plone:plone:4.0.2", "cpe:/a:plone:plone:2.5.2", "cpe:/a:plone:plone:4.2.1.1", "cpe:/a:plone:plone:2.5.4", "cpe:/a:plone:plone:4.0", "cpe:/a:plone:plone:3.0.1", "cpe:/a:plone:plone:3.0.2", "cpe:/a:plone:plone:3.2", "cpe:/a:plone:plone:3.0.6", "cpe:/a:plone:plone:1.0.4", "cpe:/a:plone:plone:3.3.1", "cpe:/a:plone:plone:4.0.3", "cpe:/a:plone:plone:2.0.5", "cpe:/a:plone:plone:4.0.4", "cpe:/a:plone:plone:4.2.2", "cpe:/a:plone:plone:2.0", "cpe:/a:plone:plone:4.3", "cpe:/a:plone:plone:3.2.1", "cpe:/a:plone:plone:3.1.6", "cpe:/a:plone:plone:3.3", "cpe:/a:plone:plone:3.3.3", "cpe:/a:plone:plone:3.2.3", "cpe:/a:plone:plone:4.2.1", "cpe:/a:plone:plone:3.0.5", "cpe:/a:plone:plone:4.2", "cpe:/a:plone:plone:2.5.5", "cpe:/a:plone:plone:4.0.1", "cpe:/a:plone:plone:2.1.3", "cpe:/a:plone:plone:3.1.2", "cpe:/a:plone:plone:1.0.5", "cpe:/a:plone:plone:2.5.1", "cpe:/a:plone:plone:3.1.7", "cpe:/a:plone:plone:2.1.2", "cpe:/a:plone:plone:3.1.3", "cpe:/a:plone:plone:4.1.4", "cpe:/a:plone:plone:3.3.2", "cpe:/a:plone:plone:2.0.2", "cpe:/a:plone:plone:3.1", "cpe:/a:plone:plone:2.1", "cpe:/a:plone:plone:4.2.0.1", "cpe:/a:plone:plone:3.3.4", "cpe:/a:plone:plone:4.1", "cpe:/a:plone:plone:1.0.2", "cpe:/a:plone:plone:3.2.2", "cpe:/a:plone:plone:1.0.6", "cpe:/a:plone:plone:3.1.1", "cpe:/a:plone:plone:1.0.3", "cpe:/a:plone:plone:2.0.3", "cpe:/a:plone:plone:4.1.5", "cpe:/a:plone:plone:4.1.6", "cpe:/a:plone:plone:2.0.4", "cpe:/a:plone:plone:3.0.3", "cpe:/a:plone:plone:2.5", "cpe:/a:plone:plone:2.1.1", "cpe:/a:plone:plone:2.1.4", "cpe:/a:plone:plone:4.0.6.1", "cpe:/a:plone:plone:3.1.4", "cpe:/a:plone:plone:3.0.4"], "affectedSoftware": [{"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.1.4"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.5.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.0.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.0.4"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.2.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.0.6.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.0.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.0.5"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.0.4"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.1.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.0.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.0.6"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.1.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.0"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.5"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.3.4"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.0.4"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.1.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.0.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "1.0.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.1.6"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.0.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.0.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.0"}, {"cpeName": "plone:plone", "name": "plone", "operator": "le", "version": "4.2.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.2.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "1.0.6"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.3.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.1.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.1.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.5.4"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.1.4"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.1.6"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "1.0"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2.1.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.1.5.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.1.5"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2.0.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.1.7"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.5.5"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "1.0.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "1.0.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.3.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.0.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.5.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.2.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.1.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "1.0.5"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.5.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "1.0.4"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.0.5"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.3"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.0"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.3.5"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.3.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "3.2.2"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.0.1"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.1.4"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "4.0.5"}, {"cpeName": "plone:plone", "name": "plone", "operator": "eq", "version": "2.0.2"}], "cvss2": {"cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2:a1:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2:a2:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2:b1:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2:b2:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*"], "cwe": ["CWE-264"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:1.0.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:1.0.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.0:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:1.0.5:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2:a1:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2:b1:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:1.0.6:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.0.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*", "versionEndIncluding": "4.2.2", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2.1.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2:rc1:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.0.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:1.0.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.0.5:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.0.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.0.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2:rc2:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:1.0:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2:b2:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:1.0.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2:a2:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:plone:plone:4.2.0.1:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}, "extraReferences": [{"name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1"}, {"name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt"}, {"name": "https://plone.org/products/plone/security/advisories/20121106/03", "refsource": "CONFIRM", "tags": ["Vendor Advisory"], "url": "https://plone.org/products/plone/security/advisories/20121106/03"}, {"name": "https://plone.org/products/plone-hotfix/releases/20121106", "refsource": "CONFIRM", "tags": ["Patch"], "url": "https://plone.org/products/plone-hotfix/releases/20121106"}]}
{}