CVE-2016-7135
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
07/03/2017
Last modified:
20/04/2025
Description
Directory traversal vulnerability in Plone CMS 5.x through 5.0.6 and 4.2.x through 4.3.11 allows remote administrators to read arbitrary files via a .. (dot dot) in the path parameter in a getFile action to Plone/++theme++barceloneta/@@plone.resourceeditor.filemanager-actions.
Impact
Base Score 3.x
4.90
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html
- http://seclists.org/fulldisclosure/2016/Oct/80
- http://www.openwall.com/lists/oss-security/2016/09/05/4
- http://www.openwall.com/lists/oss-security/2016/09/05/5
- http://www.securityfocus.com/archive/1/539572/100/0/threaded
- http://www.securityfocus.com/bid/92752
- https://plone.org/security/hotfix/20160830/filesystem-information-leak
- http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html
- http://seclists.org/fulldisclosure/2016/Oct/80
- http://www.openwall.com/lists/oss-security/2016/09/05/4
- http://www.openwall.com/lists/oss-security/2016/09/05/5
- http://www.securityfocus.com/archive/1/539572/100/0/threaded
- http://www.securityfocus.com/bid/92752
- https://plone.org/security/hotfix/20160830/filesystem-information-leak