Vulnerability Details : CVE-2012-5501
at_download.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read arbitrary BLOBs (Files and Images) stored on custom content types via a crafted URL.
Products affected by CVE-2012-5501
- cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:b2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:b1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:a2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:a1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5501
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5501
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-5501
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5501
-
https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
Products.CMFPlone/CHANGES.txt at 4.2.3 · plone/Products.CMFPlone · GitHub
-
https://plone.org/products/plone/security/advisories/20121106/17
Plone: Enterprise Level CMS - Free and OpenSource - Community Driven - SecureVendor Advisory
-
http://www.openwall.com/lists/oss-security/2012/11/10/1
oss-security - Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix
-
https://plone.org/products/plone-hotfix/releases/20121106
Plone: Enterprise Level CMS - Free and OpenSource - Community Driven - SecurePatch
Jump to