CVE-2016-7137: Plone Open Redirect Vulnerability
(updated )
Multiple open redirect vulnerabilities in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referer parameter to (1) %2b%2bgroupdashboard%2b%2bplone.dashboard1%2bgroup/%2b/portlets.Actions
or (2) folder/%2b%2bcontextportlets%2b%2bplone.footerportlets/%2b /portlets.Actions
or the (3) came_from
parameter to /login_form
.
References
- github.com/advisories/GHSA-69vh-662j-v988
- github.com/plone/Plone
- github.com/pypa/advisory-database/tree/main/vulns/plone/PYSEC-2017-60.yaml
- nvd.nist.gov/vuln/detail/CVE-2016-7137
- plone.org/security/hotfix/20160830/open-redirection-in-plone
- web.archive.org/web/20210625091607/http://www.securityfocus.com/bid/92752
- web.archive.org/web/20210625092107/http://www.securityfocus.com/archive/1/539572/100/0/threaded
Detect and mitigate CVE-2016-7137 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →