Skip to main content

Various Plone hotfixes, 2020-01-21

Project description

Plone hotfix, 2020-01-21

This hotfix fixes several security issues:

  • Privilege escalation when plone.restapi is installed. Reported and fixed by Lukas Graf and Niklaus Johner.

  • An open redirection on the login form and possibly other places where redirects are done. The isURLInPortal check that is done to avoid linking to an external site could be tricked into accepting malicious links. Reported by Damiano Esposito.

  • Password strength checks were not always checked. Reported by Ben Kummer.

  • You might be able to PUT (overwrite) some content without needing write permission. This seems hard to do in practice. This fix is only needed when you use plone.app.contenttypes. Reported and fixed by Alessandro Pisa.

  • SQL quoting in DTML or in connection objects was insufficient, leading to possible SQL injections. This is a problem in Zope. If you use Zope without Plone, this hotfix should work for you too. Reported and fixed by Michael Brunnbauer and Michael Howitz.

  • Cross Site Scripting (XSS) in the title field on plone 5.0 and higher. Reported by Marcos Valle.

Compatibility

This hotfix should be applied to the following versions of Plone:

  • Plone 5.2.1 and any earlier 5.2.x version

  • Plone 5.1.6 and any earlier 5.x version

  • Plone 4.3.19 and any earlier 4.x version

The hotfix is officially supported by the Plone security team on the following versions of Plone in accordance with the Plone version support policy: 4.3.19, 5.0.10, 5.1.6 and 5.2.1.

On Plone 4.3, 5.0 and 5.1 the hotfix is officially only supported on Python 2.7. On Plone 5.2.X it is supported on Python 2.7 and Python 3.6/3.7.

Python 2.6 should work, and earlier Plone 4 versions should work too, but this has not been fully tested.

The fixes included here will be incorporated into subsequent releases of Plone, so Plone 4.3.20, 5.1.7, 5.2.2 and greater should not require this hotfix.

Installation

Installation instructions can be found at https://plone.org/security/hotfix/20200121

Q&A

Q: How can I confirm that the hotfix is installed correctly and my site is protected?

A: On startup, the hotfix will log a number of messages to the Zope event log that look like this:

2020-01-21 13:10:26 INFO Products.PloneHotfix20200121 Applied sql_quote patch
2020-01-21 13:10:26 INFO Products.PloneHotfix20200121 Applied in_portal patch
2020-01-21 13:10:26 INFO Products.PloneHotfix20200121 Applied password_validation patch
2020-01-21 13:10:26 INFO Products.PloneHotfix20200121 Applied pac patch
2020-01-21 13:10:26 INFO Products.PloneHotfix20200121 Applied content patch
2020-01-21 13:10:26 INFO Products.PloneHotfix20200121 Applied layout patch
2020-01-21 13:10:26 INFO Products.PloneHotfix20200121 Applied restapi_local_roles patch
2020-01-21 13:10:26 INFO Products.PloneHotfix20200121 Hotfix installed

The exact number of patches applied, will differ depending on what packages you are using. If a patch is attempted but fails, it will be logged as an error that says “Could not apply”. This may indicate that you have a non-standard Plone installation. Please investigate, and mail us the accompanying traceback if you think it is a problem in the hotfix.

Q: How can I report problems installing the patch?

A: Contact the Plone security team at security@plone.org or visit the Gitter channel at https://gitter.im/plone/public and the forum at https://community.plone.org

Q: How can I report other potential security vulnerabilities?

A: Please email the security team at security@plone.org rather than discussing potential security issues publicly.

Changelog

1.0 (2020-01-21)

  • Initial release

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Products.PloneHotfix20200121-1.0.tar.gz (17.2 kB view details)

Uploaded Source

Built Distribution

Products.PloneHotfix20200121-1.0-py2.py3-none-any.whl (27.7 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file Products.PloneHotfix20200121-1.0.tar.gz.

File metadata

  • Download URL: Products.PloneHotfix20200121-1.0.tar.gz
  • Upload date:
  • Size: 17.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.11.0 pkginfo/1.4.2 requests/2.18.4 setuptools/41.0.1 requests-toolbelt/0.8.0 tqdm/4.19.6 CPython/2.7.17

File hashes

Hashes for Products.PloneHotfix20200121-1.0.tar.gz
Algorithm Hash digest
SHA256 b82c103c36ddcfe1528aee4e501e1230d055e6d604155e8b612b075ad8c4edab
MD5 c9c643e4f71e50356433d4baa408d319
BLAKE2b-256 bcc681f5428a13bd5cc92003d5a7a1057fb24e90d7358f8b38c205f7dbe5f74a

See more details on using hashes here.

File details

Details for the file Products.PloneHotfix20200121-1.0-py2.py3-none-any.whl.

File metadata

  • Download URL: Products.PloneHotfix20200121-1.0-py2.py3-none-any.whl
  • Upload date:
  • Size: 27.7 kB
  • Tags: Python 2, Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.11.0 pkginfo/1.4.2 requests/2.18.4 setuptools/41.0.1 requests-toolbelt/0.8.0 tqdm/4.19.6 CPython/2.7.17

File hashes

Hashes for Products.PloneHotfix20200121-1.0-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 a10f485984fb28a704cc13ef147dafb0f46c56eef2e56a03f9222b39edfb0b89
MD5 06cbb2ba08e844f73a40fb55e7cff1dc
BLAKE2b-256 664221664a56f5fe50ddc33add9eb681483a1d901a5d08832ec16b6ca33c608b

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page