Korean
<< Back
VID 21888
Severity 30
Port 8080, ...
Protocol TCP
Class CGI
Detailed Description The Plone is vulnerable to an access control bypass vulnerability in various MembershipTool methods. Plone is an open-source content manage system written in Python. Plone versions 2.0.4, 2.0.5, 2.1.2, and 2.5-beta1 do not restrict access to the changeMemberPortrait, deletePersonalPortrait, and testCurrentPassword methods. A remote, anonymous attacker could exploit this vulnerability to modify and delete portrait images of members.

* References:
http://dev.plone.org/plone/ticket/5432
http://www.debian.org/security/2006/dsa-1032
http://secunia.com/advisories/19633/

* Platforms Affected:
Plone versions 2.0.4, 2.0.5, 2.1.2 and 2.5-beta1
Any operating system Any version
Recommendation Apply the Hotfix for this vulnerability (2006-04-10 1.0 or later), as listed in the Plone Ticket #5432 at http://dev.plone.org/plone/ticket/5432

-- OR --

Upgrade to the latest version of Plone (2.0.6 / 2.1.3 / 2.5-beta2 or later), when they become available from the Plone Download Web site at http://plone.org/products/plone
Related URL CVE-2006-1711 (CVE)
Related URL 17484 (SecurityFocus)
Related URL 25781 (ISS)