-
-
Notifications
You must be signed in to change notification settings - Fork 195
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security issues in the background #3209
Comments
Thanks for the report. I have mailed the issue link to them (I am on the team as well). Seems you need an account for all the points you raise, and mostly at least the Site Administrator role, at least in default Plone without add-ons. So that is a big hurdle. Still, this does not look good, and we should fix this. |
Thanks for your report! Some first checks:
|
@mauritsvanrees @jensens |
…o rules. Also do not resolve entities, and remove processing instructions. See plone/Products.CMFPlone#3209
…nd remove processing instructions. See plone/Products.CMFPlone#3209
…d remove processing instructions. See plone/Products.CMFPlone#3209
…es, and remove processing instructions. See plone/Products.CMFPlone#3209
…es, and remove processing instructions. See plone/Products.CMFPlone#3209
…es, and remove processing instructions. See plone/Products.CMFPlone#3209
This could be a line of attack for a hacker. But the hacker would already need to have Manager rights to see the resulting error, before getting some useful information from this. See plone/Products.CMFPlone#3209
Pull requests are pending. See plone/Products.CMFPlone#3209
Branch: refs/heads/master Date: 2020-11-16T11:18:04+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.theming@b22ccb1 For increased security, fail when trying file protocol access in diazo rules. Also do not resolve entities, and remove processing instructions. See plone/Products.CMFPlone#3209 Files changed: A news/3209.bugfix M src/plone/app/theming/utils.py Repository: plone.app.theming Branch: refs/heads/master Date: 2020-11-16T21:17:18+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.theming@8b23f0d Merge pull request #193 from plone/maurits/cmfplone-issue-3209-lxml Fail when trying file protocol access in diazo rules Files changed: A news/3209.bugfix M src/plone/app/theming/utils.py
Branch: refs/heads/master Date: 2020-11-16T11:44:23+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.dexterity@b11b514 For increased security, in the modeleditor do not resolve entities, and remove processing instructions. See plone/Products.CMFPlone#3209 Files changed: A news/3209.bugfix M plone/app/dexterity/browser/modeleditor.py Repository: plone.app.dexterity Branch: refs/heads/master Date: 2020-11-16T21:17:35+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.dexterity@69b9c31 Merge pull request #317 from plone/maurits/cmfplone-issue-3209-lxml Modeleditor: do not resolve entities, to avoid xml vulnerabilities Files changed: A news/3209.bugfix M plone/app/dexterity/browser/modeleditor.py
Branch: refs/heads/master Date: 2020-11-16T11:44:23+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.dexterity@b11b514 For increased security, in the modeleditor do not resolve entities, and remove processing instructions. See plone/Products.CMFPlone#3209 Files changed: A news/3209.bugfix M plone/app/dexterity/browser/modeleditor.py Repository: plone.app.dexterity Branch: refs/heads/master Date: 2020-11-16T21:17:35+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.dexterity@69b9c31 Merge pull request #317 from plone/maurits/cmfplone-issue-3209-lxml Modeleditor: do not resolve entities, to avoid xml vulnerabilities Files changed: A news/3209.bugfix M plone/app/dexterity/browser/modeleditor.py
Branch: refs/heads/master Date: 2020-11-16T11:51:50+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.supermodel@ee8f4bd For increased security, in the xml parser do not resolve entities, and remove processing instructions. See plone/Products.CMFPlone#3209 Files changed: A news/3209.bugfix M plone/supermodel/parser.py Repository: plone.supermodel Branch: refs/heads/master Date: 2020-11-16T21:17:51+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.supermodel@e7a0469 Merge pull request #40 from plone/maurits/cmfplone-issue-3209-lxml In the xml parser do not resolve entities, and remove processing instructions. Files changed: A news/3209.bugfix M plone/supermodel/parser.py
Branch: refs/heads/master Date: 2020-11-16T16:57:28+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.event@3b13da0 Give validation error in ical importer when a file:// URL is used. This could be a line of attack for a hacker. But the hacker would already need to have Manager rights to see the resulting error, before getting some useful information from this. See plone/Products.CMFPlone#3209 Files changed: A news/3209.bugfix M plone/app/event/ical/importer.py Repository: plone.app.event Branch: refs/heads/master Date: 2020-11-16T21:18:04+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.event@9240012 Merge pull request #322 from plone/maurits/cmfplone-issue-3209-event Give validation error in ical importer when a file:// URL is used. Files changed: A news/3209.bugfix M plone/app/event/ical/importer.py
Branch: refs/heads/master Date: 2020-11-16T16:57:28+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.event@3b13da0 Give validation error in ical importer when a file:// URL is used. This could be a line of attack for a hacker. But the hacker would already need to have Manager rights to see the resulting error, before getting some useful information from this. See plone/Products.CMFPlone#3209 Files changed: A news/3209.bugfix M plone/app/event/ical/importer.py Repository: plone.app.event Branch: refs/heads/master Date: 2020-11-16T21:18:04+01:00 Author: Maurits van Rees (mauritsvanrees) <[email protected]> Commit: plone/plone.app.event@9240012 Merge pull request #322 from plone/maurits/cmfplone-issue-3209-event Give validation error in ical importer when a file:// URL is used. Files changed: A news/3209.bugfix M plone/app/event/ical/importer.py
I think I have fixed all affected packages. PRs are linked above. I have made releases of all of them:
These will be in Plone 5.2.3, which has been "soft released". At least one add-on is also affected, and it may have more impact there, because you don't need the Manager role to be able to use this. I have made releases of that as well: Thanks again for reporting this! We appreciate this. |
Hi @MisakiKata – thank you for reporting this issue! I am interested in improving our website and links. Can you tell me where you saw the submission method on our official website? On the plone.org's footer it says "Report bugs in Plone", which links to https://plone.org/support/bugs, on which the first paragraph has instructions on how to report security issues, i.e. using the [email protected] email address. |
Fixed! that link now points to https://plone.org/support/bugs. Thanks again @MisakiKata ! |
Hi, I found several security issues in the background, please pay attention to deal with it
address: https://www.misakikata.com/codes/plone/python-en.html
The text was updated successfully, but these errors were encountered: