cnvd-2020-62498
Vulnerability from cnvd
Title: Plone和Zope ‘BrowserIdManager.py’跨站脚本漏洞
Description:
Zope是Zope公司的一套基于Python的开源面向对象的Web应用服务器。Plone是美国Plone基金会的一套建立在Zope上的免费且开源的内容管理系统(CMS)。
Plone和Zope中存在跨站脚本漏洞,该漏洞源于程序未能正确过滤用户提交的输入。当用户浏览被影响的网站时,其浏览器将执行攻击者提供的任意脚本代码,这可能导致攻击者窃取基于cookie的身份认证并发起其它攻击。
Severity: 中
Patch Name: Plone和Zope ‘BrowserIdManager.py’跨站脚本漏洞的补丁
Patch Description:
Zope是Zope公司的一套基于Python的开源面向对象的Web应用服务器。Plone是美国Plone基金会的一套建立在Zope上的免费且开源的内容管理系统(CMS)。
Plone和Zope中存在跨站脚本漏洞,该漏洞源于程序未能正确过滤用户提交的输入。当用户浏览被影响的网站时,其浏览器将执行攻击者提供的任意脚本代码,这可能导致攻击者窃取基于cookie的身份认证并发起其它攻击。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://plone.org/ https://www.zope.org/
Reference: https://nvd.nist.gov/vuln/detail/CVE-2013-7062
Impacted products
Name | ['Plone Plone 4.2', 'Plone Plone 4.1', 'Plone Plone 3.3', 'Plone Plone 4.0', 'Plone Plone 3.3.1', 'Plone Plone 3.3.2', 'Plone Plone 3.3.3', 'Plone Plone 3.3.4', 'Plone Plone 3.3.5', 'Zope Zope 3.3.3', 'Plone Plone 4.1.3', 'Plone Plone 4.0.8', 'Plone Plone 4.0.7', 'Plone Plone 4.0.1', 'Plone Plone 4.0.2', 'Plone Plone 4.0.3', 'Plone Plone 4.0.4', 'Plone Plone 4.0.5', 'Plone Plone 4.0.9'] |
---|
{ "bids": { "bid": { "bidNumber": "64219" } }, "cves": { "cve": { "cveNumber": "CVE-2013-7062", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2013-7062" } }, "description": "Zope\u662fZope\u516c\u53f8\u7684\u4e00\u5957\u57fa\u4e8ePython\u7684\u5f00\u6e90\u9762\u5411\u5bf9\u8c61\u7684Web\u5e94\u7528\u670d\u52a1\u5668\u3002Plone\u662f\u7f8e\u56fdPlone\u57fa\u91d1\u4f1a\u7684\u4e00\u5957\u5efa\u7acb\u5728Zope\u4e0a\u7684\u514d\u8d39\u4e14\u5f00\u6e90\u7684\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf\uff08CMS\uff09\u3002\n\nPlone\u548cZope\u4e2d\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u8fc7\u6ee4\u7528\u6237\u63d0\u4ea4\u7684\u8f93\u5165\u3002\u5f53\u7528\u6237\u6d4f\u89c8\u88ab\u5f71\u54cd\u7684\u7f51\u7ad9\u65f6\uff0c\u5176\u6d4f\u89c8\u5668\u5c06\u6267\u884c\u653b\u51fb\u8005\u63d0\u4f9b\u7684\u4efb\u610f\u811a\u672c\u4ee3\u7801\uff0c\u8fd9\u53ef\u80fd\u5bfc\u81f4\u653b\u51fb\u8005\u7a83\u53d6\u57fa\u4e8ecookie\u7684\u8eab\u4efd\u8ba4\u8bc1\u5e76\u53d1\u8d77\u5176\u5b83\u653b\u51fb\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://plone.org/\r\nhttps://www.zope.org/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2020-62498", "openTime": "2020-11-12", "patchDescription": "Zope\u662fZope\u516c\u53f8\u7684\u4e00\u5957\u57fa\u4e8ePython\u7684\u5f00\u6e90\u9762\u5411\u5bf9\u8c61\u7684Web\u5e94\u7528\u670d\u52a1\u5668\u3002Plone\u662f\u7f8e\u56fdPlone\u57fa\u91d1\u4f1a\u7684\u4e00\u5957\u5efa\u7acb\u5728Zope\u4e0a\u7684\u514d\u8d39\u4e14\u5f00\u6e90\u7684\u5185\u5bb9\u7ba1\u7406\u7cfb\u7edf\uff08CMS\uff09\u3002\r\n\r\nPlone\u548cZope\u4e2d\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u8fc7\u6ee4\u7528\u6237\u63d0\u4ea4\u7684\u8f93\u5165\u3002\u5f53\u7528\u6237\u6d4f\u89c8\u88ab\u5f71\u54cd\u7684\u7f51\u7ad9\u65f6\uff0c\u5176\u6d4f\u89c8\u5668\u5c06\u6267\u884c\u653b\u51fb\u8005\u63d0\u4f9b\u7684\u4efb\u610f\u811a\u672c\u4ee3\u7801\uff0c\u8fd9\u53ef\u80fd\u5bfc\u81f4\u653b\u51fb\u8005\u7a83\u53d6\u57fa\u4e8ecookie\u7684\u8eab\u4efd\u8ba4\u8bc1\u5e76\u53d1\u8d77\u5176\u5b83\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Plone\u548cZope \u2018BrowserIdManager.py\u2019\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Plone Plone 4.2", "Plone Plone 4.1", "Plone Plone 3.3", "Plone Plone 4.0", "Plone Plone 3.3.1", "Plone Plone 3.3.2", "Plone Plone 3.3.3", "Plone Plone 3.3.4", "Plone Plone 3.3.5", "Zope Zope 3.3.3", "Plone Plone 4.1.3", "Plone Plone 4.0.8", "Plone Plone 4.0.7", "Plone Plone 4.0.1", "Plone Plone 4.0.2", "Plone Plone 4.0.3", "Plone Plone 4.0.4", "Plone Plone 4.0.5", "Plone Plone 4.0.9" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2013-7062", "serverity": "\u4e2d", "submitTime": "2020-01-07", "title": "Plone\u548cZope \u2018BrowserIdManager.py\u2019\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…