Plone pickled代码 远程代码执行漏洞

漏洞信息详情

Plone pickled代码 远程代码执行漏洞

漏洞简介

Plone 远程攻击者借助包含pickled的网络数据执行任意Python代码,这些数据对应(1) statusmessages 或(2)linkintegrity模块。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

Plone Plone 2.5-beta1

Plone PloneHotfix20071106.tar.gz

http://plone.org/products/plone-hotfix/releases/20071106/PloneHotfix20

071106.tar.gz

Plone Plone 3.0

Plone PloneHotfix20071106.tar.gz

http://plone.org/products/plone-hotfix/releases/20071106/PloneHotfix20071106.tar.gz

Plone Plone 2.5

Plone PloneHotfix20071106.tar.gz

http://plone.org/products/plone-hotfix/releases/20071106/PloneHotfix20

071106.tar.gz

Plone Plone 2.5.1

Plone PloneHotfix20071106.tar.gz

http://plone.org/products/plone-hotfix/releases/20071106/PloneHotfix20071106.tar.gz

Plone Plone 2.5.4

Plone PloneHotfix20071106.tar.gz

http://plone.org/products/plone-hotfix/releases/20071106/PloneHotfix20071106.tar.gz

Plone Plone 3.0.1

Plone PloneHotfix20071106.tar.gz

http://plone.org/products/plone-hotfix/releases/20071106/PloneHotfix20071106.tar.gz

Plone Plone 3.0.2

Plone PloneHotfix20071106.tar.gz

http://plone.org/products/plone-hotfix/releases/20071106/PloneHotfix20071106.tar.gz

参考网址

来源: BID

名称: 26354

链接:http://www.securityfocus.com/bid/26354

来源: BUGTRAQ

名称: 20071106 [CVE-2007-5741] Plone: statusmessages and linkintegrity unsafe network data hotfix

链接:http://www.securityfocus.com/archive/1/archive/1/483343/100/0/threaded

来源: VUPEN

名称: ADV-2007-3754

链接:http://www.frsirt.com/english/advisories/2007/3754

来源: SECUNIA

名称: 27530

链接:http://secunia.com/advisories/27530

来源: plone.org

链接:http://plone.org/about/security/advisories/cve-2007-5741

来源: OSVDB

名称: 42072

链接:http://osvdb.org/42072

来源: OSVDB

名称: 42071

链接:http://osvdb.org/42071

来源: XF

名称: plone-pythoncode-execution(38288)

链接:http://xforce.iss.net/xforce/xfdb/38288

来源: DEBIAN

名称: DSA-1405

链接:http://www.debian.org/security/2007/dsa-1405

来源: SECUNIA

名称: 27559

链接:http://secunia.com/advisories/27559

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享