|
Message-ID: <CAL8hw9GrJsZk5uVN2aY9EdBo2uahxLbQFG8j_5=ArC8Z+cGfKA@mail.gmail.com> Date: Mon, 12 Oct 2015 09:47:06 -0500 From: Nathan Van Gheem <nathan.van.gheem@...ne.org> To: oss-security@...ts.openwall.com Subject: CVE Request: Plone CSRF Hi, Can a CVE be assigned to this issue, please? https://plone.org/security/20151006/multiple-csrf-vulnerabilities-in-zope Plone is built on the Zope2 application framework. In the Zope2 application framework, there are multiple CSRF vulnerabilities. The latest version of Plone has automatic CSRF protection integrated at the database layer. This patch basically backports the latest automatically CSRF infrastructure to Plone 4.x. The relevant code is in: https://github.com/plone/plone.protect and https://github.com/plone/plone4.csrffixes finally, more information about the problem: https://plone.org/products/plone/security/advisories/security-vulnerability-20151006-csrf The vendor credits with the discovery: John Page ( hyp3rlinx ) Thanks, let me know if you'd like more information. Thanks, Nathan
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.