Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0yMmptLXAydnYtajJoY84AAV-I
Plone XSS
z3c.form in Plone CMS 5.x through 5.0.6 and 4.x through 4.3.11 allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted GET request.
Permalink: https://github.com/advisories/GHSA-22jm-p2vv-j2hcJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yMmptLXAydnYtajJoY84AAV-I
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 2 months ago
CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Percentage: 0.00347
EPSS Percentile: 0.72017
Identifiers: GHSA-22jm-p2vv-j2hc, CVE-2016-7136
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-7136
- https://plone.org/security/hotfix/20160830/non-persistent-xss-in-plone-forms
- http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html
- http://seclists.org/fulldisclosure/2016/Oct/80
- http://www.openwall.com/lists/oss-security/2016/09/05/4
- http://www.openwall.com/lists/oss-security/2016/09/05/5
- https://web.archive.org/web/20210625091607/http://www.securityfocus.com/bid/92752
- https://web.archive.org/web/20210625092107/http://www.securityfocus.com/archive/1/539572/100/0/threaded
- https://github.com/pypa/advisory-database/tree/main/vulns/plone/PYSEC-2017-59.yaml
- https://github.com/advisories/GHSA-22jm-p2vv-j2hc
Affected Packages
pypi:plone
Dependent packages: 5Dependent repositories: 7
Downloads: 10,091 last month
Affected Version Ranges: >= 4.0.0, <= 4.3.11, >= 5.0.0, <= 5.0.6
No known fixed version
All affected versions: 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.0.8, 4.0.9, 4.0.10, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.1.6, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.2.5, 4.2.6, 4.2.7, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 4.3.8, 4.3.9, 4.3.10, 4.3.11, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6