fkie_cve-2012-5508
Vulnerability from fkie_nvd
Published
2014-11-03 22:55
Modified
2025-04-12 10:46
Severity ?
Summary
The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zope.
Impacted products
Vendor Product Version
plone plone *
plone plone 1.0
plone plone 1.0.1
plone plone 1.0.2
plone plone 1.0.3
plone plone 1.0.4
plone plone 1.0.5
plone plone 1.0.6
plone plone 2.0
plone plone 2.0.1
plone plone 2.0.2
plone plone 2.0.3
plone plone 2.0.4
plone plone 2.0.5
plone plone 2.1
plone plone 2.1.1
plone plone 2.1.2
plone plone 2.1.3
plone plone 2.1.4
plone plone 2.5
plone plone 2.5.1
plone plone 2.5.2
plone plone 2.5.3
plone plone 2.5.4
plone plone 2.5.5
plone plone 3.0
plone plone 3.0.1
plone plone 3.0.2
plone plone 3.0.3
plone plone 3.0.4
plone plone 3.0.5
plone plone 3.0.6
plone plone 3.1
plone plone 3.1.1
plone plone 3.1.2
plone plone 3.1.3
plone plone 3.1.4
plone plone 3.1.5.1
plone plone 3.1.6
plone plone 3.1.7
plone plone 3.2
plone plone 3.2.1
plone plone 3.2.2
plone plone 3.2.3
plone plone 3.3
plone plone 3.3.1
plone plone 3.3.2
plone plone 3.3.3
plone plone 3.3.4
plone plone 3.3.5
plone plone 4.0
plone plone 4.0.1
plone plone 4.0.2
plone plone 4.0.3
plone plone 4.0.4
plone plone 4.0.5
plone plone 4.0.6.1
plone plone 4.1
plone plone 4.1.4
plone plone 4.1.5
plone plone 4.1.6
plone plone 4.2
plone plone 4.2.1
plone plone 4.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17D1DF1B-1EAE-4B2E-89D5-A97301AE3164",
              "versionEndIncluding": "4.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2A9AE1-47C9-4073-BC2C-08C62874FFF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3802A1E1-0816-449E-858E-20039F4ED5DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC1E9D9C-97A0-4093-9492-493B1B4CD4B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4099B8D1-1F79-4BFB-943E-158E7394D90B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0E119C-876F-4226-AF5F-44763EEBA29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4937F4A-147C-4AD8-BB88-C3C3C9C8ADBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "035E2851-A3D4-4E90-8602-F500DC469C3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDEAEAC-3B26-4C95-865C-326ACD793133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA5D3643-BFBB-48BE-802C-D6CD940945F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC29D0-66F9-4A1A-86A6-8FD427825112",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E33FEC-33DA-45AC-8095-0D3C74FADC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FC93EC3-FE5D-410E-8DE5-2346D839F56C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D4EB7F-BC46-4F2E-B065-303961C47B1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08747064-EC22-40B4-92EF-4640788FE55D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4EB85E3-9A76-4B79-AF7D-91484784A2EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78755057-2613-4D5E-8F59-2C117EE282B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D49359CD-63EF-4D3A-92DC-C16DEE88138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE940BA-B784-4193-AB77-333F15B6C32D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9762C674-380B-4831-BBA1-3B27742121B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D938645-80CE-4287-830E-A3BD0C5C84FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB0F7BFC-DC20-46B3-90E7-264E3A8A7886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C09C10-AEA0-41F4-B964-507B40580BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B60568E-A688-46AF-B627-062A029A7324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B635DAD-AC53-4484-8750-200B662DAFD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B647E76-E8B8-4329-8848-3B90EB262807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D0A6B8F-4018-44DC-9862-45309619DC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F10374F-2BB3-48D2-B19F-9B2D038A8E35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEAC4F93-D26C-48F3-A7FF-8DC008FC2671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "552661B7-093D-4B3C-8770-FCDE6032AA17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5180F9D2-E44B-455D-968C-792026AC832A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "636226E4-B880-41FE-A727-EF56CF8E6249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF6E934A-C344-4861-8CD4-D18D52672D5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "25780BBE-8013-4100-9EA8-7EFC244399A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A089ED64-07E6-4F4C-97AE-AF74269A4DB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2334C9-9B34-4C7D-93A2-172E596E05C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "354046F4-FA55-4AFC-935A-C803D36CDE86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1496A7-6D0A-4970-B0BF-83758065BC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DEF57C-92F0-4999-AF8E-CEE27EE92CD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BED4241-D823-402A-A389-7E52C410E2F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9A55E6-F265-4BB8-8683-3E0CFA01EC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "970FD910-50A4-478A-ADE6-EB912C261DAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A490523-1063-44E4-A72A-C23070279181",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8559F17-63D1-45DB-8A28-47F729DC6686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDC93803-6506-4382-A013-18010EE7E06B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65977FD-A880-4D16-B56B-94A72774F42D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EA5B4F8-2155-403D-97D8-1272285D508B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3CA2943-77E5-4384-A019-415BBCE62F94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7FF63F6-F1DC-4A97-A2E6-11CF613A31E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "538A3519-5B04-4FE5-A3C0-FD26EFA32705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3306D84-0F5B-46BA-9BCC-DCD0A1CDD604",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08F4534-A588-463F-A745-39E559AB1CB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64341BA-5722-415E-9771-9837168AB7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2929227-AE19-428D-9AC3-D312A559039B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B6DC866-0FEE-475B-855C-A69E004810CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "50BF3E8E-152C-4E89-BAA2-A952D10F4611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DB97A7-89DD-43C0-A490-84AA7069764B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C44B53B-953B-4522-A5B4-11573850D2CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "47321B60-67DA-4543-B173-D629A9569B45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B36EB2-723F-4E25-8018-EEB2BE806D9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7962EF74-6AC1-424C-A202-163AFDADA971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F1818BB-E23A-4136-898D-1D0C80C08728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CB06627-133A-40D1-8816-E31E0A9BAD22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE168A35-1A46-4A6F-8A08-25CDD886066D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors.  NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zope."
    },
    {
      "lang": "es",
      "value": "Las p\u00e1ginas de errores en Plone anterior a 4.2.3 y 4.3 anterior a beta 1 permiten a atacantes remotos obtener n\u00fameros aleatorios y derivar el estado PRNG para la restablecimiento de contrase\u00f1as a trav\u00e9s de vectores no especificados. NOTA: este identificador fue dividido (SPLIT) per ADT2 debido a tipos diferentes de vulnerabilidades. CVE-2012-6661 fue asignado para el problema de la reinicializaci\u00f3n del PRNG en Zope."
    }
  ],
  "id": "CVE-2012-5508",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-03T22:55:05.883",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.launchpad.net/zope2/+bug/1071067"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://plone.org/products/plone-hotfix/releases/20121124"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://plone.org/products/plone/security/advisories/20121106/24"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.launchpad.net/zope2/+bug/1071067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://plone.org/products/plone-hotfix/releases/20121124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://plone.org/products/plone/security/advisories/20121106/24"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…