[Japanese]

JVNDB-2021-000076

Plone vulnerable to open redirect

Overview

Plone provided by Plone Foundation contains an open redirect vulnerability (CWE-601).

Yuji Tounai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 4.7 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Changed
  • Confidentiality Impact: None
  • Integrity Impact: Low
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


Plone Foundation
  • Plone versions prior to 5.2.5, with versions prior to 1.2.0 of the package "Products.isurlinportal"

Impact

When accessing a specially crafted URL, the user may be redirected to an arbitrary website. As a result, the user may become a victim of a phishing attack.
Solution

[Apply the Patch]
Apply the patch according to the information provided by the developer.
The developer has released the patch "Products.isurlinportal 1.2.0" for Plone 4.3 and 5 that addresses the vulnerability

According to the developer, Plone 5.2.5 that contains a fix for this vulnerability will be released.
Vendor Information

Plone Foundation
CWE (What is CWE?)

  1. Improper Input Validation(CWE-20) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2021-32806
References

  1. JVN : JVN#50804280
Revision History

  • [2021/08/12]
      Web page was published