Skip to main content

Various Plone hotfixes, 2013-06-18

Project description

Plone hotfix, 2013-06-18

This hotfix fixes multiple vulnerabilities in Plone, including arbitrary code execution and privilege escalation.

This hotfix should be applied to the following versions of Plone:

  • Plone <= 4.3.1

  • Plone <= 4.2.6

  • Any older version of Plone including 2.1, 2.5, 3.0, 3.1, 3.2, 3.3, 4.0, and 4.1

The hotfix is officially supported by the Plone security team on the following versions of Plone in accordance with the Plone version support policy: 3.3.6, 4.1.6, 4.2.6, 4.3 and 4.3.1. However it has also received some testing on older versions of Plone. The fixes included here will be incorporated into subsequent releases of Plone, so Plone 4.2.7, 4.3.2 and greater should not require this hotfix.

Hotfix versions

Please note that there is a version 1.1 of the hotfix. Version 1.0 was discovered to cause problems on Plone 2.1 systems and with certain add ons in other versions of Plone. If you’re just getting around to installing the hotfix now or if you’re experiencing issues with version 1.0 of the hotfix, please install version 1.1.

Installation

Installation instructions can also be found at http://plone.org/products/plone-hotfix/releases/20130618

Q&A

Q: How can I confirm that the hotfix is installed correctly and my site is protected?

A: On startup, the hotfix will log a number of messages to the Zope event log that look like this:

2013-06-18 21:15:26 INFO Products.PloneHotfix20130618 Applied typeswidget patch

The exact list of patches attempted depends on the version of Plone. If a patch is attempted but fails, it will be logged as a warning that says “Could not apply”. This may indicate that you have a non-standard Plone installation.

Q: How can I report problems installing the patch?

A: Contact the Plone security team at security@plone.org, or visit the #plone channel on freenode IRC.

Q: How can I report other potential security vulnerabilities?

A: Please email the security team at security@plone.org rather than discussing potential security issues publicly.

Changelog

1.1 (2013-06-18)

  • fix spamProtect to only strip text if a string

  • fix issue with getObject

  • do not patch __bobo_traverse__ as it’s unnecessary

1.0 (2013-06-18)

  • Initial release

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Products.PloneHotfix20130618-1.1.zip (37.1 kB view details)

Uploaded Source

File details

Details for the file Products.PloneHotfix20130618-1.1.zip.

File metadata

File hashes

Hashes for Products.PloneHotfix20130618-1.1.zip
Algorithm Hash digest
SHA256 37cc2d39b08695dae908de3f4fa4eabee5201b5aa71acf2c3d37ef888ac30abb
MD5 9900176427209dcde8e31d1d8e9e2888
BLAKE2b-256 69c03f226d581c4bf05f4f3734357bb1a3e8cc41ae1f1518771875933df0f16d

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page