2023-09-21 16:00:28 +00:00
{
"id" : "CVE-2023-42457" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2023-09-21T15:15:10.943" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:22:34.500" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-09-21 16:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "plone.rest allows users to use HTTP verbs such as GET, POST, PUT, DELETE, etc. in Plone. Starting in the 2.x branch and prior to versions 2.0.1 and 3.0.1, when the `++api++` traverser is accidentally used multiple times in a url, handling it takes increasingly longer, making the server less responsive. Patches are available in `plone.rest` 2.0.1 and 3.0.1. Series 1.x is not affected. As a workaround, one may redirect `/++api++/++api++` to `/++api++` in one's frontend web server (nginx, Apache).\n"
2023-09-21 18:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "plone.rest permite a los usuarios utilizar verbos HTTP como GET, POST, PUT, DELETE, etc. en Plone. A partir de la rama 2.x y antes de las versiones 2.0.1 y 3.0.1, cuando el recorridor `++api++` se usa accidentalmente varias veces en una URL, su manejo lleva cada vez m\u00e1s tiempo, lo que hace que el servidor responda menos. Los parches est\u00e1n disponibles en `plone.rest` 2.0.1 y 3.0.1. La serie 1.x no se ve afectada. Como workaround, se puede redirigir `/++api++/++api++` a `/++api++` en el servidor web frontend (nginx, Apache)."
2023-09-21 16:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-09-25 20:00:28 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
2023-09-25 20:00:28 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-09-25 20:00:28 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-09-25 20:00:28 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
} ,
2023-09-21 16:00:28 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-09-21 16:00:28 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-09-21 16:00:28 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-09-21 16:00:28 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
2024-12-08 03:06:42 +00:00
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
2023-09-25 20:00:28 +00:00
"description" : [
2024-12-08 03:06:42 +00:00
{
"lang" : "en" ,
"value" : "CWE-400"
} ,
2023-09-25 20:00:28 +00:00
{
"lang" : "en" ,
"value" : "CWE-770"
}
]
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-09-21 16:00:28 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-770"
}
]
}
] ,
2023-09-25 20:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:rest:2.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5CD311A9-2185-4CC1-9FDB-8EB5F33DEB07"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:plone:rest:3.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "73CAED86-5DE2-49CD-9AF0-5DB6C73670B3"
}
]
}
]
}
] ,
2023-09-21 16:00:28 +00:00
"references" : [
2023-09-22 16:00:28 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2023/09/22/2" ,
2023-09-25 20:00:28 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
2023-09-22 16:00:28 +00:00
} ,
2023-09-21 16:00:28 +00:00
{
"url" : "https://github.com/plone/plone.rest/commit/43b4a7e86206e237e1de5ca3817ed071575882f7" ,
2023-09-25 20:00:28 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2023-09-21 16:00:28 +00:00
} ,
{
"url" : "https://github.com/plone/plone.rest/commit/77846a9842889b24f35e8bedc2e9d461388d3302" ,
2023-09-25 20:00:28 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2023-09-21 16:00:28 +00:00
} ,
{
"url" : "https://github.com/plone/plone.rest/security/advisories/GHSA-h6rp-mprm-xgcq" ,
2023-09-25 20:00:28 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2023/09/22/2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/plone/plone.rest/commit/43b4a7e86206e237e1de5ca3817ed071575882f7" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://github.com/plone/plone.rest/commit/77846a9842889b24f35e8bedc2e9d461388d3302" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://github.com/plone/plone.rest/security/advisories/GHSA-h6rp-mprm-xgcq" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-09-21 16:00:28 +00:00
}
]
}