Vulnerability Details : CVE-2016-7137
Multiple open redirect vulnerabilities in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referer parameter to (1) %2b%2bgroupdashboard%2b%2bplone.dashboard1%2bgroup/%2b/portlets.Actions or (2) folder/%2b%2bcontextportlets%2b%2bplone.footerportlets/%2b /portlets.Actions or the (3) came_from parameter to /login_form.
Vulnerability category: Open redirect
Exploit prediction scoring system (EPSS) score for CVE-2016-7137
Probability of exploitation activity in the next 30 days: 0.34%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 68 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-7137
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
nvd@nist.gov |
6.1
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
nvd@nist.gov |
CWE ids for CVE-2016-7137
-
A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7137
-
http://seclists.org/fulldisclosure/2016/Oct/80
Full Disclosure: Multiple Vulnerabilities in Plone CMSThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/archive/1/539572/100/0/threaded
SecurityFocus
-
http://www.openwall.com/lists/oss-security/2016/09/05/4
oss-security - Re: CVE request: Plone multiple vulnerabilitiesMailing List;Patch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/09/05/5
oss-security - Re: CVE request: Plone multiple vulnerabilitiesMailing List;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/92752
Plone Multiple Security vulnerabilities
-
https://plone.org/security/hotfix/20160830/open-redirection-in-plone
Open Redirection in Plone — Plone.orgVendor Advisory
-
http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html
Plone CMS 4.3.11 / 5.0.6 XSS / Traversal / Open Redirection ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Products affected by CVE-2016-7137
- cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.1a1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0:a1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*