{"id":"PYSEC-2017-58","details":"Directory traversal vulnerability in Plone CMS 5.x through 5.0.6 and 4.2.x through 4.3.11 allows remote administrators to read arbitrary files via a .. (dot dot) in the path parameter in a getFile action to Plone/++theme++barceloneta/@@plone.resourceeditor.filemanager-actions.","aliases":["CVE-2016-7135","GHSA-m7f9-65wr-pwch"],"modified":"2024-04-29T11:41:23.375668Z","published":"2017-03-07T16:59:00Z","references":[{"type":"WEB","url":"https://plone.org/security/hotfix/20160830/filesystem-information-leak"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/09/05/5"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/09/05/4"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2016/Oct/80"},{"type":"WEB","url":"http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/92752"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/539572/100/0/threaded"}],"affected":[{"package":{"name":"plone","ecosystem":"PyPI","purl":"pkg:pypi/plone"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.0"},{"fixed":"5.0.7"},{"introduced":"4.2"},{"fixed":"4.3.12"}]}],"versions":["4.2","4.2.1","4.2.2","4.2.3","4.2.4","4.2.5","4.2.6","4.2.7","4.3","4.3.1","4.3.10","4.3.11","4.3.2","4.3.3","4.3.4","4.3.5","4.3.6","4.3.7","4.3.8","4.3.9","4.3a1","4.3a2","4.3b1","4.3b2","4.3rc1","5.0","5.0.1","5.0.2","5.0.3","5.0.4","5.0.5","5.0.6"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/plone/PYSEC-2017-58.yaml"}}],"schema_version":"1.7.3"}