Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1oanA1LWh2MzMtcTU4Z82zkw
Plone credentials stored in session cookie
Plone CMS 3.1.x uses invariant data (a client username and a server secret) when calculating an HMAC-SHA1 value for an authentication cookie, which makes it easier for remote attackers to gain permanent access to an account by sniffing the network.
Permalink: https://github.com/advisories/GHSA-hjp5-hv33-q58gJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oanA1LWh2MzMtcTU4Z82zkw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 8 months ago
Identifiers: GHSA-hjp5-hv33-q58g, CVE-2008-1396
References:
- https://nvd.nist.gov/vuln/detail/CVE-2008-1396
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41421
- http://securityreason.com/securityalert/3754
- http://www.procheckup.com/Hacking_Plone_CMS.pdf
- http://www.securityfocus.com/archive/1/489544/100/0/threaded
- https://github.com/advisories/GHSA-hjp5-hv33-q58g
Affected Packages
pypi:plone
Dependent packages: 5Dependent repositories: 7
Downloads: 7,986 last month
Affected Version Ranges: <= 3.1.7
No known fixed version
All affected versions: