An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS00aHBqLThyaHYtOXg4N84AA0OV

High CVSS: 8.7 EPSS: 0.00218% (0.44377 Percentile) EPSS:

Products.CMFCore unauthenticated denial of service and crash via unchecked use of input with Python's marshal module

Affected Packages Affected Versions Fixed Versions
pypi:Products.CMFCore
PURL: pkg:pypi/products.cmfcore
< 2.7.1 2.7.1
10 Dependent packages
1 Dependent repositories
46,625 Downloads last month

Affected Version Ranges

All affected versions

2.1.1, 2.1.2, 2.1.2-beta, 2.1.3, 2.2.0, 2.2.0-alpha, 2.2.0-beta, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.2.9, 2.2.10, 2.2.11, 2.2.12, 2.2.13, 2.3.0, 2.3.0-beta, 2.3.0-beta2, 2.3.1, 2.4.0, 2.4.0b1, 2.4.0b2, 2.4.0b3, 2.4.0b4, 2.4.0b5, 2.4.0b6, 2.4.0b7, 2.4.0b8, 2.4.1, 2.4.2, 2.4.3, 2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.5.0, 2.5.1, 2.5.2, 2.5.3, 2.5.4, 2.6.0, 2.7.0

All unaffected versions

2.7.1

Impact

The use of Python's marshal module to handle unchecked input in a public method on PortalFolder objects can lead to an unauthenticated denial of service and crash situation. The code in question is exposed by all portal software built on top of Products.CMFCore, such as Plone. All deployments are vulnerable.

Patches

The code has been fixed in Products.CMFCore version 3.2.

Workarounds

Users can make the affected decodeFolderFilter method unreachable by editing the PortalFolder.py module in Products.CMFCore by hand and then restarting Zope. Go to line 233 of PortalFolder.py and remove both the @security.public decorator for decodeFolderFilter as well as the method's entire docstring. This is safe because the method is not actually used by current code.

References

Credits

Thanks go to Nicolas VERDIER from onepoint.

For more information

If you have any questions or comments about this advisory:

References: