An issue in Plone Docker Official Image 5.2.13 (5221) open-source software allows for remote code execution via improper validation of input by the HOST headers.
References
Link | Resource |
---|---|
http://plone.com | Broken Link |
http://ploneorg.com | Product |
https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 | Exploit Third Party Advisory |
http://plone.com | Broken Link |
http://ploneorg.com | Product |
https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://plone.com - Broken Link | |
References | () http://ploneorg.com - Product | |
References | () https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 - Exploit, Third Party Advisory |
02 Feb 2024, 17:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://plone.com - Broken Link | |
References | () https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 - Exploit, Third Party Advisory | |
References | () http://ploneorg.com - Product | |
First Time |
Plone
Plone plone Docker Official Image |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:a:plone:plone_docker_official_image:5.2.13:*:*:*:*:*:*:* |
25 Jan 2024, 22:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-25 22:15
Updated : 2024-11-21 08:56
NVD link : CVE-2024-23055
Mitre link : CVE-2024-23055
CVE.ORG link : CVE-2024-23055
JSON object : View
Products Affected
plone
- plone_docker_official_image
CWE