Vulnerability Details : CVE-2012-5487
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.
Products affected by CVE-2012-5487
- cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:b2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:b1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:a2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:a1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5487
0.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 63 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5487
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:M/Au:S/C:C/I:C/A:C |
6.8
|
10.0
|
NIST |
CWE ids for CVE-2012-5487
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5487
-
https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
Products.CMFPlone/CHANGES.txt at 4.2.3 · plone/Products.CMFPlone · GitHub
-
http://www.openwall.com/lists/oss-security/2012/11/10/1
oss-security - Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix
-
https://plone.org/products/plone/security/advisories/20121106/03
Plone: Enterprise Level CMS - Free and OpenSource - Community Driven - SecureVendor Advisory
-
https://plone.org/products/plone-hotfix/releases/20121106
Plone: Enterprise Level CMS - Free and OpenSource - Community Driven - SecurePatch
Jump to