|
Message-ID: <74cef8b2-e764-5644-0062-5cdad687bd6b@vanrees.org> Date: Mon, 31 Jan 2022 09:34:53 +0100 From: Maurits van Rees <maurits@...rees.org> To: oss-security@...ts.openwall.com Subject: Plone: cache poisoning in image_view_fullscreen Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Usually only anonymous users are affected, but this depends on your cache settings. Versions Affected: All supported Plone versions (4.3.20 and any earlier 4.3.x version, 5.2.6 and any earlier 5.x version, 6.0.0a2 and any earlier 6.0.0 version). There are updated packages for Plone 5.2: plone.app.contenttypes 2.2.3 Products.ATContentTypes 3.0.6 And updated packages for 6.0 (which is in alpha): plone.app.contenttypes 3.0.0a9 With the default version pins, new Plone 5.2.7 and 6.0.0a3 are not affected. Earlier versions are. CVE number: CVE-2022-23599. More information: - GitHub: https://github.com/plone/Products.CMFPlone/security/advisories/GHSA-8w54-22w9-3g8f - community.plone.org: https://community.plone.org/t/security-fix-for-image-view-fullscreen-cache-poisoning/14757?u=mauritsvanrees - plone.org: https://plone.org/security/hotfix/20220128 -- Maurits van Rees https://maurits.vanrees.org/
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.