CVE-2012-6661: Plone and Zope2 do not reseed pseudo-random number generator
(updated )
Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).
References
- bugs.launchpad.net/zope2/+bug/1071067
- github.com/advisories/GHSA-48vv-2pmq-9fvv
- github.com/plone/Products.CMFPlone
- github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt
- github.com/pypa/advisory-database/tree/main/vulns/plone/PYSEC-2014-51.yaml
- github.com/pypa/advisory-database/tree/main/vulns/zope2/PYSEC-2014-76.yaml
- nvd.nist.gov/vuln/detail/CVE-2012-6661
- plone.org/products/plone-hotfix/releases/20121124
- plone.org/products/plone/security/advisories/20121106/24
Detect and mitigate CVE-2012-6661 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →