CVE-2024-23055

An issue in Plone Docker Official Image 5.2.13 (5221) open-source software allows for remote code execution via improper validation of input by the HOST headers.
References
Link Resource
http://plone.com Broken Link
http://ploneorg.com Product
https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:plone:plone_docker_official_image:5.2.13:*:*:*:*:*:*:*

History

02 Feb 2024, 17:05

Type Values Removed Values Added
References () http://plone.com - () http://plone.com - Broken Link
References () https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 - () https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 - Exploit, Third Party Advisory
References () http://ploneorg.com - () http://ploneorg.com - Product
First Time Plone
Plone plone Docker Official Image
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CWE NVD-CWE-Other
CPE cpe:2.3:a:plone:plone_docker_official_image:5.2.13:*:*:*:*:*:*:*

25 Jan 2024, 22:18

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-25 22:15

Updated : 2024-02-28 20:54


NVD link : CVE-2024-23055

Mitre link : CVE-2024-23055

CVE.ORG link : CVE-2024-23055


JSON object : View

Products Affected

plone

  • plone_docker_official_image