Various Plone hotfixes, 2013-06-18
This hotfix fixes multiple vulnerabilities in Plone, including arbitrary code execution and privilege escalation.
This hotfix should be applied to the following versions of Plone:
The hotfix is officially supported by the Plone security team on the following versions of Plone in accordance with the Plone version support policy: 3.3.6, 4.1.6, 4.2.6, 4.3 and 4.3.1. However it has also received some testing on older versions of Plone. The fixes included here will be incorporated into subsequent releases of Plone, so Plone 4.2.6, 4.3.1 and greater should not require this hotfix.
Please note that there is a version 1.3 of the hotfix. Version 1.0 was discovered to cause problems on Plone 2.1 systems and with certain add ons in other versions of Plone. Version 1.1 also contained a few mintor issues. If you’re just getting around to installing the hotfix now or if you’re experiencing issues with version 1.0 or 1.1 of the hotfix, please install version 1.3.
Installation instructions can be found at http://plone.org/products/plone-hotfix/releases/20130618
A: On startup, the hotfix will log a number of messages to the Zope event log that look like this:
2013-06-18 21:15:26 INFO Products.PloneHotfix20130618 Applied typeswidget patch
The exact list of patches attempted depends on the version of Plone. If a patch is attempted but fails, it will be logged as a warning that says “Could not apply”. This may indicate that you have a non-standard Plone installation.
- Initial release