PYSEC-2023-113

Vulnerability from pysec - Published: 2023-07-03 17:15 - Updated: 2023-07-17 20:27
VLAI?
Details

Products.CMFCore are the key framework services for the Zope Content Management Framework (CMF). The use of Python's marshal module to handle unchecked input in a public method on PortalFolder objects can lead to an unauthenticated denial of service and crash situation. The code in question is exposed by all portal software built on top of Products.CMFCore, such as Plone. All deployments are vulnerable. The code has been fixed in Products.CMFCore version 3.2.

Impacted products
Name purl
products-cmfcore pkg:pypi/products-cmfcore

{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "products-cmfcore",
        "purl": "pkg:pypi/products-cmfcore"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "40f03f43a60f28ca9485c8ef429efef729be54e5"
            }
          ],
          "repo": "https://github.com/zopefoundation/Products.CMFCore",
          "type": "GIT"
        },
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "3.2"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ],
      "versions": [
        "2.1.1",
        "2.1.2",
        "2.1.2-beta",
        "2.1.3",
        "2.2.0",
        "2.2.0-alpha",
        "2.2.0-beta",
        "2.2.1",
        "2.2.10",
        "2.2.11",
        "2.2.12",
        "2.2.13",
        "2.2.2",
        "2.2.3",
        "2.2.4",
        "2.2.5",
        "2.2.6",
        "2.2.7",
        "2.2.8",
        "2.2.9",
        "2.3.0",
        "2.3.0-beta",
        "2.3.0-beta2",
        "2.3.1",
        "2.4.0",
        "2.4.0b1",
        "2.4.0b2",
        "2.4.0b3",
        "2.4.0b4",
        "2.4.0b5",
        "2.4.0b6",
        "2.4.0b7",
        "2.4.0b8",
        "2.4.1",
        "2.4.2",
        "2.4.3",
        "2.4.4",
        "2.4.5",
        "2.4.6",
        "2.4.7",
        "2.4.8",
        "2.5.0",
        "2.5.1",
        "2.5.2",
        "2.5.3",
        "2.5.4",
        "2.6.0",
        "2.7.0",
        "3.0",
        "3.1"
      ]
    }
  ],
  "aliases": [
    "CVE-2023-36814",
    "GHSA-4hpj-8rhv-9x87"
  ],
  "details": "Products.CMFCore are the key framework services for the Zope Content Management Framework (CMF). The use of Python\u0027s marshal module to handle unchecked input in a public method on `PortalFolder` objects can lead to an unauthenticated denial of service and crash situation. The code in question is exposed by all portal software built on top of `Products.CMFCore`, such as Plone. All deployments are vulnerable. The code has been fixed in `Products.CMFCore` version 3.2.",
  "id": "PYSEC-2023-113",
  "modified": "2023-07-17T20:27:51.578279+00:00",
  "published": "2023-07-03T17:15:00+00:00",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/zopefoundation/Products.CMFCore/security/advisories/GHSA-4hpj-8rhv-9x87"
    },
    {
      "type": "FIX",
      "url": "https://github.com/zopefoundation/Products.CMFCore/commit/40f03f43a60f28ca9485c8ef429efef729be54e5"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/zopefoundation/Products.CMFCore/commit/40f03f43a60f28ca9485c8ef429efef729be54e5"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…