
CVE-2021-3313
https://notcve.org/view.php?id=CVE-2021-3313
20 May 2021 — Plone CMS until version 5.2.4 has a stored Cross-Site Scripting (XSS) vulnerability in the user fullname property and the file upload functionality. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript in the context of the victim's browser if the victim opens a vulnerable page containing an XSS payload. Plone CMS hasta versión 5.2.4 presenta una vulnerabilidad de tipo Cro... • http://www.openwall.com/lists/oss-security/2021/05/22/1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-29002
https://notcve.org/view.php?id=CVE-2021-29002
24 Mar 2021 — A stored cross-site scripting (XSS) vulnerability in Plone CMS 5.2.3 exists in site-controlpanel via the "form.widgets.site_title" parameter. Se presenta una vulnerabilidad de tipo cross-site scripting (XSS) almacenado en Plone CMS versión 5.2.3 en el site-controlpanel por medio del parámetro "form.widgets.site_title" • https://github.com/miguelc49/CVE-2021-29002-1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-21336 – Exposure of Sensitive Information to an Unauthorized Actor in Products.PluggableAuthService ZODBRoleManager
https://notcve.org/view.php?id=CVE-2021-21336
08 Mar 2021 — Products.PluggableAuthService is a pluggable Zope authentication and authorization framework. In Products.PluggableAuthService before version 2.6.0 there is an information disclosure vulnerability - everyone can list the names of roles defined in the ZODB Role Manager plugin if the site uses this plugin. The problem has been fixed in version 2.6.0. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to 2.6.0 and re-run the buildout, or if you used pi... • http://www.openwall.com/lists/oss-security/2021/05/21/1 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2020-28736
https://notcve.org/view.php?id=CVE-2020-28736
30 Dec 2020 — Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role). Plone versiones anteriores a 5.2.3, permite ataques de tipo XXE por medio de una funcionalidad que está protegida por un permiso no aplicado de plone.schemaeditor.ManageSchemata (por lo tanto, solo está disponible para el rol de Administrador). • https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2020-28735
https://notcve.org/view.php?id=CVE-2020-28735
30 Dec 2020 — Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role). Plone versiones anteriores a 5.2.3, permite ataques de tipo SSRF por medio de la funcionalidad tracebacks (solo disponible para el rol de administrador). • https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2020-28734
https://notcve.org/view.php?id=CVE-2020-28734
30 Dec 2020 — Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role. Plone versiones anteriores a 5.2.3, permite ataques de tipo XXE por medio de una funcionalidad que solo está disponible explícitamente para el rol de administrador. • https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2020-35190
https://notcve.org/view.php?id=CVE-2020-35190
17 Dec 2020 — The official plone Docker images before version of 4.3.18-alpine (Alpine specific) contain a blank password for a root user. System using the plone docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password. Las imágenes de Docker de official plone versiones anteriores a la versión 4.3.18-alpine (específica de Alpine) contienen una contraseña en blanco para un usuario root. El sistema que usa el contenedor de docker plone ... • https://github.com/koharin/koharin2/blob/main/CVE-2020-35190 • CWE-306: Missing Authentication for Critical Function •

CVE-2020-7936
https://notcve.org/view.php?id=CVE-2020-7936
23 Jan 2020 — An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1 allows an attacker to craft a link to a Plone Site that, when followed, and possibly after login, will redirect to an attacker's site. Un redireccionamiento abierto en el formulario de inicio de sesión (y posiblemente en otros lugares) en Plone versiones 4.0 hasta 5.2.1, permite a un atacante diseñar un enlace hacia un Sitio de Plone que, cuando es seguido, y posiblemente después del inicio de sesión, redireccionará ha... • http://www.openwall.com/lists/oss-security/2020/01/24/1 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2020-7937
https://notcve.org/view.php?id=CVE-2020-7937
23 Jan 2020 — An XSS issue in the title field in Plone 5.0 through 5.2.1 allows users with a certain privilege level to insert JavaScript that will be executed when other users access the site. Un problema de tipo XSS en el campo title en Plone versiones 5.0 hasta 5.2.1, permite a usuarios con un determinado nivel de privilegio insertar JavaScript que será ejecutado cuando otros usuarios accedan al sitio. • http://www.openwall.com/lists/oss-security/2020/01/24/1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-7938
https://notcve.org/view.php?id=CVE-2020-7938
23 Jan 2020 — plone.restapi in Plone 5.2.0 through 5.2.1 allows users with a certain privilege level to escalate their privileges up to the highest level. plone.restapi en Plone versiones 5.2.0 hasta 5.2.1, permite a usuarios con un determinado nivel de privilegio escalar sus privilegios hasta el nivel más alto. • http://www.openwall.com/lists/oss-security/2020/01/24/1 •