Vulnerabilites related to redhat - luci
CVE-2011-0720 (GCVE-0-2011-0720)
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-08-06 22:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:05:53.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "70753", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70753" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://plone.org/products/plone/security/advisories/cve-2011-0720" }, { "name": "46102", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46102" }, { "name": "43146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43146" }, { "name": "RHSA-2011:0393", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0393.html" }, { "name": "plone-unspec-priv-escalation(65099)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65099" }, { "name": "ADV-2011-0796", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0796" }, { "name": "43914", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43914" }, { "name": "1025258", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025258" }, { "name": "RHSA-2011:0394", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0394.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "70753", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70753" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://plone.org/products/plone/security/advisories/cve-2011-0720" }, { "name": "46102", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46102" }, { "name": "43146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43146" }, { "name": "RHSA-2011:0393", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0393.html" }, { "name": "plone-unspec-priv-escalation(65099)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65099" }, { "name": "ADV-2011-0796", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0796" }, { "name": "43914", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43914" }, { "name": "1025258", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025258" }, { "name": "RHSA-2011:0394", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0394.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0720", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "70753", "refsource": "OSVDB", "url": "http://osvdb.org/70753" }, { "name": "http://plone.org/products/plone/security/advisories/cve-2011-0720", "refsource": "CONFIRM", "url": "http://plone.org/products/plone/security/advisories/cve-2011-0720" }, { "name": "46102", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46102" }, { "name": "43146", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43146" }, { "name": "RHSA-2011:0393", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0393.html" }, { "name": "plone-unspec-priv-escalation(65099)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65099" }, { "name": "ADV-2011-0796", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0796" }, { "name": "43914", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43914" }, { "name": "1025258", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025258" }, { "name": "RHSA-2011:0394", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0394.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0720", "datePublished": "2011-02-03T16:00:00", "dateReserved": "2011-01-31T00:00:00", "dateUpdated": "2024-08-06T22:05:53.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3852 (GCVE-0-2010-3852)
Vulnerability from cvelistv5
Published
2010-11-05 22:00
Modified
2024-08-07 03:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The default configuration of Luci 0.22.4 and earlier in Red Hat Conga uses "[INSERT SECRET HERE]" as its secret key for cookies, which makes it easier for remote attackers to bypass repoze.who authentication via a forged ticket cookie.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:12.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-2900", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2900" }, { "name": "44611", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44611" }, { "name": "42123", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42123" }, { "name": "ADV-2010-2873", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2873" }, { "name": "FEDORA-2010-16617", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050244.html" }, { "name": "42113", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42113" }, { "name": "FEDORA-2010-16848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050309.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=626504" }, { "name": "69015", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/69015" }, { "name": "luci-whoini-weak-security(62980)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62980" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.fedorahosted.org/git/?p=luci.git%3Ba=commit%3Bh=9e0bbf0c5faa198379d945474f7d55da5031cacf" }, { "name": "FEDORA-2010-16601", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050246.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of Luci 0.22.4 and earlier in Red Hat Conga uses \"[INSERT SECRET HERE]\" as its secret key for cookies, which makes it easier for remote attackers to bypass repoze.who authentication via a forged ticket cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2010-2900", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2900" }, { "name": "44611", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44611" }, { "name": "42123", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42123" }, { "name": "ADV-2010-2873", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2873" }, { "name": "FEDORA-2010-16617", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050244.html" }, { "name": "42113", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42113" }, { "name": "FEDORA-2010-16848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050309.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=626504" }, { "name": "69015", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/69015" }, { "name": "luci-whoini-weak-security(62980)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62980" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.fedorahosted.org/git/?p=luci.git%3Ba=commit%3Bh=9e0bbf0c5faa198379d945474f7d55da5031cacf" }, { "name": "FEDORA-2010-16601", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050246.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3852", "datePublished": "2010-11-05T22:00:00", "dateReserved": "2010-10-08T00:00:00", "dateUpdated": "2024-08-07T03:26:12.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2010-11-06 00:00
Modified
2025-04-11 00:51
Severity ?
Summary
The default configuration of Luci 0.22.4 and earlier in Red Hat Conga uses "[INSERT SECRET HERE]" as its secret key for cookies, which makes it easier for remote attackers to bypass repoze.who authentication via a forged ticket cookie.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://git.fedorahosted.org/git/?p=luci.git%3Ba=commit%3Bh=9e0bbf0c5faa198379d945474f7d55da5031cacf | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050244.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050246.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050309.html | ||
secalert@redhat.com | http://osvdb.org/69015 | ||
secalert@redhat.com | http://secunia.com/advisories/42113 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/42123 | Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/44611 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2010/2873 | Vendor Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2010/2900 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=626504 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/62980 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://git.fedorahosted.org/git/?p=luci.git%3Ba=commit%3Bh=9e0bbf0c5faa198379d945474f7d55da5031cacf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050244.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050246.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050309.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/69015 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42113 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42123 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/44611 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2873 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2900 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=626504 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/62980 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:luci:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9CDDFBC-3FDF-4233-9A43-137F129FC922", "versionEndIncluding": "0.22.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:conga:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFDB782C-6A31-43A7-9A61-E94020AEE956", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration of Luci 0.22.4 and earlier in Red Hat Conga uses \"[INSERT SECRET HERE]\" as its secret key for cookies, which makes it easier for remote attackers to bypass repoze.who authentication via a forged ticket cookie." }, { "lang": "es", "value": "La configuraci\u00f3n por defecto de Luci v0.22.4 y anteriores en Red Hat Conga utiliza \"[INSERT SECRET HERE]\" como su clave secreta para las cookies, lo que facilita a los atacantes remotos el saltarse la autenticaci\u00f3n a trav\u00e9s de una cookie repoze.who falsificada." } ], "id": "CVE-2010-3852", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-11-06T00:00:02.423", "references": [ { "source": "secalert@redhat.com", "url": "http://git.fedorahosted.org/git/?p=luci.git%3Ba=commit%3Bh=9e0bbf0c5faa198379d945474f7d55da5031cacf" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050244.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050246.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050309.html" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/69015" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42113" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42123" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/44611" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2873" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2010/2900" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=626504" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.fedorahosted.org/git/?p=luci.git%3Ba=commit%3Bh=9e0bbf0c5faa198379d945474f7d55da5031cacf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050244.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050246.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050309.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/69015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/44611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2873" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2900" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=626504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62980" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/70753 | ||
cve@mitre.org | http://plone.org/products/plone/security/advisories/cve-2011-0720 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/43146 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/43914 | Vendor Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2011-0393.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2011-0394.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/46102 | ||
cve@mitre.org | http://www.securitytracker.com/id?1025258 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2011/0796 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/65099 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/70753 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://plone.org/products/plone/security/advisories/cve-2011-0720 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43146 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43914 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0393.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0394.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46102 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025258 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0796 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65099 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
plone | plone | 2.5 | |
plone | plone | 2.5.1 | |
plone | plone | 2.5.2 | |
plone | plone | 2.5.3 | |
plone | plone | 2.5.4 | |
plone | plone | 2.5.5 | |
plone | plone | 3.0 | |
plone | plone | 3.0.1 | |
plone | plone | 3.0.2 | |
plone | plone | 3.0.3 | |
plone | plone | 3.0.4 | |
plone | plone | 3.0.5 | |
plone | plone | 3.0.6 | |
plone | plone | 3.1 | |
plone | plone | 3.1.1 | |
plone | plone | 3.1.2 | |
plone | plone | 3.1.3 | |
plone | plone | 3.1.4 | |
plone | plone | 3.1.5.1 | |
plone | plone | 3.1.6 | |
plone | plone | 3.1.7 | |
plone | plone | 3.2 | |
plone | plone | 3.2.1 | |
plone | plone | 3.2.2 | |
plone | plone | 3.2.3 | |
plone | plone | 3.3 | |
plone | plone | 3.3.1 | |
plone | plone | 3.3.2 | |
plone | plone | 3.3.3 | |
plone | plone | 3.3.4 | |
plone | plone | 3.3.5 | |
plone | plone | 4.0 | |
redhat | conga | * | |
redhat | luci | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9762C674-380B-4831-BBA1-3B27742121B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D938645-80CE-4287-830E-A3BD0C5C84FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BB0F7BFC-DC20-46B3-90E7-264E3A8A7886", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F2C09C10-AEA0-41F4-B964-507B40580BE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7B60568E-A688-46AF-B627-062A029A7324", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B635DAD-AC53-4484-8750-200B662DAFD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B647E76-E8B8-4329-8848-3B90EB262807", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D0A6B8F-4018-44DC-9862-45309619DC6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "0F10374F-2BB3-48D2-B19F-9B2D038A8E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEAC4F93-D26C-48F3-A7FF-8DC008FC2671", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "552661B7-093D-4B3C-8770-FCDE6032AA17", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "5180F9D2-E44B-455D-968C-792026AC832A", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "636226E4-B880-41FE-A727-EF56CF8E6249", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF6E934A-C344-4861-8CD4-D18D52672D5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "25780BBE-8013-4100-9EA8-7EFC244399A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A089ED64-07E6-4F4C-97AE-AF74269A4DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "EF2334C9-9B34-4C7D-93A2-172E596E05C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "354046F4-FA55-4AFC-935A-C803D36CDE86", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DF1496A7-6D0A-4970-B0BF-83758065BC6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "47DEF57C-92F0-4999-AF8E-CEE27EE92CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4BED4241-D823-402A-A389-7E52C410E2F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "CE9A55E6-F265-4BB8-8683-3E0CFA01EC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "970FD910-50A4-478A-ADE6-EB912C261DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "0A490523-1063-44E4-A72A-C23070279181", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D8559F17-63D1-45DB-8A28-47F729DC6686", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "FDC93803-6506-4382-A013-18010EE7E06B", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E65977FD-A880-4D16-B56B-94A72774F42D", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4EA5B4F8-2155-403D-97D8-1272285D508B", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3CA2943-77E5-4384-A019-415BBCE62F94", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B7FF63F6-F1DC-4A97-A2E6-11CF613A31E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "538A3519-5B04-4FE5-A3C0-FD26EFA32705", "vulnerable": true }, { "criteria": "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3306D84-0F5B-46BA-9BCC-DCD0A1CDD604", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:conga:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFDB782C-6A31-43A7-9A61-E94020AEE956", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:luci:*:*:*:*:*:*:*:*", "matchCriteriaId": "00AB76EC-83A6-405B-858F-CE4FF59AEAEA", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors." }, { "lang": "es", "value": "Una vulnerabilidad no especificada en Plone versi\u00f3n 2.5 hasta 4.0, como se utiliza en Conga, luci, y posiblemente otros productos, permite a los atacantes remotos obtener acceso administrativo, leer o crear contenido arbitrario, y cambiar el aspecto del sitio por medio de vectores desconocidos." } ], "id": "CVE-2011-0720", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:03.773", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/70753" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://plone.org/products/plone/security/advisories/cve-2011-0720" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43146" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43914" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0393.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0394.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/46102" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025258" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0796" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/70753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://plone.org/products/plone/security/advisories/cve-2011-0720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0393.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0394.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65099" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }