Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-42457
HistorySep 21, 2023 - 2:49 p.m.

CVE-2023-42457 plone.rest vulnerable to Denial of Service when ++api++ is used many times

2023-09-2114:49:32
CWE-400
CWE-770
GitHub_M
www.cve.org
plone.rest
http verbs
vulnerability

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

23.2%

plone.rest allows users to use HTTP verbs such as GET, POST, PUT, DELETE, etc. in Plone. Starting in the 2.x branch and prior to versions 2.0.1 and 3.0.1, when the ++api++ traverser is accidentally used multiple times in a url, handling it takes increasingly longer, making the server less responsive. Patches are available in plone.rest 2.0.1 and 3.0.1. Series 1.x is not affected. As a workaround, one may redirect /++api++/++api++ to /++api++ in one’s frontend web server (nginx, Apache).

CNA Affected

[
  {
    "vendor": "plone",
    "product": "plone.rest",
    "versions": [
      {
        "version": ">= 2.0.0a1, < 2.0.1",
        "status": "affected"
      },
      {
        "version": "= 3.0.0",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

23.2%

Related for CVELIST:CVE-2023-42457