Vulnerability Name: | CVE-2021-3313 (CCN-202369) | ||||||||||||
Assigned: | 2021-05-20 | ||||||||||||
Published: | 2021-05-20 | ||||||||||||
Updated: | 2021-05-25 | ||||||||||||
Summary: | Plone CMS until version 5.2.4 has a stored Cross-Site Scripting (XSS) vulnerability in the user fullname property and the file upload functionality. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript in the context of the victim's browser if the victim opens a vulnerable page containing an XSS payload. | ||||||||||||
CVSS v3 Severity: | 5.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
6.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-3313 Source: MITRE Type: CNA CVE-2021-33512 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20210522 Re: Plone security hotfix 20210518 Source: XF Type: UNKNOWN plonecms-cve202133512-xss(202369) Source: CCN Type: Plone Web site Plone Source: MISC Type: Release Notes, Vendor Advisory https://plone.org/download/releases/5.2.3 Source: MISC Type: Vendor Advisory https://plone.org/security/hotfix/20210518 Source: CCN Type: oss-sec Mailing List, Sat, 22 May 2021 13:34:10 +0200 Re: Plone security hotfix 20210518 Source: MISC Type: Exploit, Third Party Advisory https://www.compass-security.com/fileadmin/Research/Advisories/2021-07_CSNC-2021-013_XSS_in_Plone_CMS.txt | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |