Skip to main content

Various Plone hotfixes, 2016-08-30

Project description

Plone hotfix, 2016-08-30

This hotfix fixes several security issues:

  • An attacker could bypass Plone’s security method to check if a url is a valid, safe url on the site which can lead to XSS attacks on certain pages.

  • In multiple places, Plone blindly uses the referer header to redirect a user to the next page after a particular action. An attacker could utilize this to draw a user into a redirection attack.

  • z3c.form will currently accept data from GET requests when the form is supposed to be POST. This allows a user to inject a potential XSS attack into a form, which when saved, will cause a XSS attack. Moreover, with certain widgets in Plone admin forms, the input is expected to be safe and can cause a reflexive XSS attack.

  • Fixes XSS on user information page.

  • Fixes XSS on multiple ZMI pages

  • By using relative paths and guessing locations on a server Plone is installed on, an attacker can read data from a target server that the process running Plone has permission to read. The attacker needs administrator privileges on the Plone site to perform this attack.

This hotfix should be applied to the following versions of Plone:

  • Plone 5.0.6 and any earlier 5.x version

  • Plone 4.3.11 and any earlier 4.x version

  • Any older version of Plone

The hotfix is officially supported by the Plone security team on the following versions of Plone in accordance with the Plone version support policy: 4.0.10, 4.1.6, 4.2.7, 4.3.11 and 5.0.6. However it has also received some testing on older versions of Plone. The fixes included here will be incorporated into subsequent releases of Plone, so Plone 4.3.12, 5.0.7 and greater should not require this hotfix.

Installation

Installation instructions can be found at https://plone.org/security/hotfix/20160830

If you are using versions of plone.protect prior to 3, the “confirm” patch is not necessary and will not successfully apply.

On default installs of Plone 4.x, the “user” patch will not successfully apply and does not need to be patched. The patch is only applied when a version of plone.app.users greater than 2 is installed.

Q&A

Q: How can I confirm that the hotfix is installed correctly and my site is protected?

A: On startup, the hotfix will log a number of messages to the Zope event log that look like this:

2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied resource patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied confirm patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied z3c_form patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied in_portal patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied plonerootlogin patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied redirects patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied redirect_folderfactories patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied redirect_qi patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied redirectto patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied discussion patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied user patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied zmi patch
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Hotfix installed

The exact number of patches applied, will differ depending on what packages you are using. If a patch is attempted but fails, it will be logged as a warning that says “Could not apply”. This may indicate that you have a non-standard Plone installation.

Q: How can I report problems installing the patch?

A: Contact the Plone security team at security@plone.org, or visit the #plone channel on freenode IRC.

Q: How can I report other potential security vulnerabilities?

A: Please email the security team at security@plone.org rather than discussing potential security issues publicly.

Changelog

1.0 (2016-08-30)

  • Initial release

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Products.PloneHotfix20160830-1.0.tar.gz (19.3 kB view details)

Uploaded Source

File details

Details for the file Products.PloneHotfix20160830-1.0.tar.gz.

File metadata

File hashes

Hashes for Products.PloneHotfix20160830-1.0.tar.gz
Algorithm Hash digest
SHA256 ea73a8345cc5e36f6c4adec2c54a0ec23416fe9eda99e535af92c6e78f2c5c67
MD5 b403088bf99c533e274b6b46e9c92dd8
BLAKE2b-256 9213d7371cf730ac1d131366f192963cce900f9a7a61d92f4896ee594240a986

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page