CVE-2021-33926

An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3, 5.1b2, 5.1a2, 5.1a1, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.2, 5.1.1 5.1, 5.0rc3, 5.0rc2, 5.0rc1, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.10, 5.0.1, 5.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.20, 4 allows attacker to access sensitive information via the RSS feed protlet.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.12:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.14:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.15:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.17:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.18:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.19:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.20:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:-:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1:alpha2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.7:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1a1:alpha1:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1a2:beta4:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1b2:beta3:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1b3:beta2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1b4:rc2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1rc1:rc1:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1rc2:-:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-02-17 18:15

Updated : 2024-02-28 19:51


NVD link : CVE-2021-33926

Mitre link : CVE-2021-33926

CVE.ORG link : CVE-2021-33926


JSON object : View

Products Affected

plone

  • plone
CWE
CWE-918

Server-Side Request Forgery (SSRF)