Debian Security Advisory DSA 1405-2 introduces a regression fix for zope-cmfplone, addressing a vulnerability that allows remote code execution via web browser cookies
Reporter | Title | Published | Views | Family All 25 |
---|---|---|---|---|
![]() | Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl) | 7 Nov 200700:00 | – | securityvulns |
![]() | [CVE-2007-5741] Plone: statusmessages and linkintegrity unsafe network data hotfix | 7 Nov 200700:00 | – | securityvulns |
![]() | [SECURITY] [DSA 1405-1] New zope-cmfplone packages fix arbitrary code execution | 9 Nov 200722:38 | – | debian |
![]() | [SECURITY] [DSA 1405-3] New zope-cmfplone packages fix regression | 27 Dec 200721:21 | – | debian |
![]() | [SECURITY] [DSA 1405-2] New zope-cmfplone packages fix regression | 11 Nov 200716:43 | – | debian |
![]() | Debian Security Advisory DSA 1405-2 (zope-cmfplone) | 17 Jan 200800:00 | – | openvas |
![]() | FreeBSD Ports: plone | 4 Sep 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 1405-1 (zope-cmfplone) | 17 Jan 200800:00 | – | openvas |
![]() | FreeBSD Ports: plone | 4 Sep 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 1405-3 (zope-cmfplone) | 17 Jan 200800:00 | – | openvas |
Source | Link |
---|---|
secure1 | www.secure1.securityspace.com/smysecure/catid.html |
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.58739");
script_version("2025-01-17T05:37:18+0000");
script_tag(name:"last_modification", value:"2025-01-17 05:37:18 +0000 (Fri, 17 Jan 2025)");
script_tag(name:"creation_date", value:"2008-01-17 23:23:47 +0100 (Thu, 17 Jan 2008)");
script_cve_id("CVE-2007-5741");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("Debian Security Advisory DSA 1405-2 (zope-cmfplone)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 E-Soft Inc.");
script_family("Debian Local Security Checks");
script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201405-2");
script_tag(name:"insight", value:"The zope-cmfplone update in DSA 1405 introduced a regression. This update
corrects this flaw. For completeness, the original advisory text below:
It was discovered that Plone, a web content management system, allows
remote attackers to execute arbitrary code via specially crafted web
browser cookies.
The oldstable distribution (sarge) is not affected by this problem.
For the stable distribution (etch) this problem has been fixed in
version 2.5.1-4etch2.
For the unstable distribution (sid) this problem will be fixed soon.");
script_tag(name:"solution", value:"We recommend that you upgrade your zope-cmfplone package.");
script_tag(name:"summary", value:"The remote host is missing an update to zope-cmfplone announced via advisory DSA 1405-2.
This VT has been deprecated and merged into the VT 'Debian: Security Advisory (DSA-1405)' (OID: 1.3.6.1.4.1.25623.1.0.60071).");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"deprecated", value:TRUE);
exit(0);
}
exit(66);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo