CVE-2024-23054

An issue in Plone Docker Official Image 5.2.13 (5221) open-source software that could allow for remote code execution due to a package listed in ++plone++static/components not existing in the public package index (npm).
References
Link Resource
http://plone.com Not Applicable
http://ploneorg.com Product
https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-23054/README.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:plone:plone_docker_official_image:5.2.13:*:*:*:*:*:*:*

History

13 Feb 2024, 18:27

Type Values Removed Values Added
First Time Plone
Plone plone Docker Official Image
CWE CWE-427
CPE cpe:2.3:a:plone:plone_docker_official_image:5.2.13:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () http://plone.com - () http://plone.com - Not Applicable
References () https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-23054/README.md - () https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-23054/README.md - Exploit, Third Party Advisory
References () http://ploneorg.com - () http://ploneorg.com - Product

05 Feb 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-05 16:15

Updated : 2024-07-03 01:47


NVD link : CVE-2024-23054

Mitre link : CVE-2024-23054

CVE.ORG link : CVE-2024-23054


JSON object : View

Products Affected

plone

  • plone_docker_official_image
CWE
CWE-427

Uncontrolled Search Path Element