CVE-2015-7316: Plone Cross-site Scripting Vulnerability
(updated )
Plone’s URL checking infrastructure includes a method for checking if URLs valid and located in the Plone site. By passing HTML into a specially crafted url containing <script
, %3Cscript
, javascript:
, or javascript%3A
, Cross-site Scripting can be achieved.
References
- bugzilla.redhat.com/show_bug.cgi?id=1264788
- github.com/advisories/GHSA-vf8g-m3vq-6p4p
- github.com/plone/Plone
- github.com/plone/Products.CMFPlone/commit/3da710a2cd68587f0bf34f2e7ea1167d6eeee087
- github.com/pypa/advisory-database/tree/main/vulns/plone/PYSEC-2017-53.yaml
- nvd.nist.gov/vuln/detail/CVE-2015-7316
- plone.org/security/hotfix/20150910/non-persistent-xss-in-plone
- pypi.org/project/Products.PloneHotfix20150910
Detect and mitigate CVE-2015-7316 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →