CVE-2017-5524: Plone Sandbox Escape
(updated )
Plone 4.x through 4.3.11 and 5.x through 5.0.6 allow remote attackers to bypass a sandbox protection mechanism and obtain sensitive information by leveraging the Python string format method.
References
- github.com/advisories/GHSA-p5wr-vp8g-q5p4
- github.com/plone/Products.CMFPlone/commit/a7d47692058e10ce89968e7ca4dacbdf44fcad4f
- github.com/plone/Products.CMFPlone/pull/1912
- github.com/pypa/advisory-database/tree/main/vulns/plone/PYSEC-2017-81.yaml
- nvd.nist.gov/vuln/detail/CVE-2017-5524
- plone.org/security/hotfix/20170117/sandbox-escape
Detect and mitigate CVE-2017-5524 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →