Vulnerability Name:
CVE-2012-5493 (CCN-102852)
Assigned:
2012-10-30
Published:
2012-10-30
Updated:
2014-10-01
Summary:
gtbn.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain permissions to bypass the Python sandbox and execute arbitrary Python code via unspecified vectors.
CVSS v3 Severity:
8.0 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
Low
User Interaction (UI):
Required
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
8.5 High
(CVSS v2 Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C
)
6.3 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
8.5 High
(CCN CVSS v2 Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C
)
6.3 Medium
(CCN Temporal CVSS v2 Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Athentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-94
Vulnerability Consequences:
Gain Access
References:
Source: MITRE
Type: CNA
CVE-2012-5493
Source: CCN
Type: oss-security Mailing List, Fri, 09 Nov 2012 22:47:49 -0700
Zope / Plone: Multiple vectors corrected within 20121106 fix
Source: MLIST
Type: UNKNOWN
[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix
Source: XF
Type: UNKNOWN
plone-cve20125493-code-exec(102852)
Source: CONFIRM
Type: UNKNOWN
https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
Source: CONFIRM
Type: Patch
https://plone.org/products/plone-hotfix/releases/20121106
Source: CCN
Type: Plone Security Advisory
Restricted Python sandbox escape
Source: CONFIRM
Type: Vendor Advisory
https://plone.org/products/plone/security/advisories/20121106/09
Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2012-5493
Vulnerable Configuration:
Configuration 1
:
cpe:/a:plone:plone:1.0:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:1.0.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:1.0.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:1.0.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:1.0.4:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:1.0.5:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:1.0.6:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.0:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.0.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.0.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.0.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.0.4:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.0.5:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.1.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.1.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.1.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.1.4:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.5:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.5.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.5.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.5.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.5.4:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:2.5.5:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.0:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.0.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.0.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.0.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.0.4:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.0.5:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.0.6:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.1.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.1.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.1.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.1.4:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.1.5.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.1.6:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.1.7:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.2.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.2.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.2.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.3.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.3.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.3.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.3.4:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:3.3.5:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.0:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.0.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.0.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.0.3:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.0.4:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.0.5:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.0.6.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.1.4:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.1.5:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.1.6:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2:a1:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2:a2:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2:b1:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2:b2:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2:rc1:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2:rc2:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2.0.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:4.2.1.1:*:*:*:*:*:*:*
OR
cpe:/a:plone:plone:*:*:*:*:*:*:*:*
(Version <= 4.2.2)
OR
cpe:/a:plone:plone:4.3:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:plone:plone:4.2:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
plone
plone 1.0
plone
plone 1.0.1
plone
plone 1.0.2
plone
plone 1.0.3
plone
plone 1.0.4
plone
plone 1.0.5
plone
plone 1.0.6
plone
plone 2.0
plone
plone 2.0.1
plone
plone 2.0.2
plone
plone 2.0.3
plone
plone 2.0.4
plone
plone 2.0.5
plone
plone 2.1
plone
plone 2.1.1
plone
plone 2.1.2
plone
plone 2.1.3
plone
plone 2.1.4
plone
plone 2.5
plone
plone 2.5.1
plone
plone 2.5.2
plone
plone 2.5.3
plone
plone 2.5.4
plone
plone 2.5.5
plone
plone 3.0
plone
plone 3.0.1
plone
plone 3.0.2
plone
plone 3.0.3
plone
plone 3.0.4
plone
plone 3.0.5
plone
plone 3.0.6
plone
plone 3.1
plone
plone 3.1.1
plone
plone 3.1.2
plone
plone 3.1.3
plone
plone 3.1.4
plone
plone 3.1.5.1
plone
plone 3.1.6
plone
plone 3.1.7
plone
plone 3.2
plone
plone 3.2.1
plone
plone 3.2.2
plone
plone 3.2.3
plone
plone 3.3
plone
plone 3.3.1
plone
plone 3.3.2
plone
plone 3.3.3
plone
plone 3.3.4
plone
plone 3.3.5
plone
plone 4.0
plone
plone 4.0.1
plone
plone 4.0.2
plone
plone 4.0.3
plone
plone 4.0.4
plone
plone 4.0.5
plone
plone 4.0.6.1
plone
plone 4.1
plone
plone 4.1.4
plone
plone 4.1.5
plone
plone 4.1.6
plone
plone 4.2
plone
plone 4.2 a1
plone
plone 4.2 a2
plone
plone 4.2 b1
plone
plone 4.2 b2
plone
plone 4.2 rc1
plone
plone 4.2 rc2
plone
plone 4.2.0.1
plone
plone 4.2.1
plone
plone 4.2.1.1
plone
plone *
plone
plone 4.3
plone
plone 4.2