Lucene search

K
githubGitHub Advisory DatabaseGHSA-25JH-5H5R-H33M
HistoryMay 17, 2022 - 4:32 a.m.

Plone Sandbox Bypass

2022-05-1704:32:23
CWE-94
CWE-693
GitHub Advisory Database
github.com
4

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

71.2%

gtbn.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain permissions to bypass the Python sandbox and execute arbitrary Python code via unspecified vectors.

Affected configurations

Vulners
Node
ploneploneRange<4.3b1
OR
ploneploneRange<4.2.3
CPENameOperatorVersion
plonelt4.3b1
plonelt4.2.3

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

71.2%

Related for GHSA-25JH-5H5R-H33M