Vulnerability Details : CVE-2017-1000483
Accessing private content via str.format in through-the-web templates and scripts in Plone 2.5-5.1rc1. This improves an earlier hotfix. Since the format method was introduced in Python 2.6, this part of the hotfix is only relevant for Plone 4 and 5.
Products affected by CVE-2017-1000483
- cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.1:a1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.1:a2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.1:b4:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.1:b2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.1:b3:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:5.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-1000483
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-1000483
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
References for CVE-2017-1000483
-
https://plone.org/security/hotfix/20171128/sandbox-escape
Sandbox escape — Plone.orgVendor Advisory
Jump to