An issue in Plone Docker Official Image 5.2.13 (5221) open-source software allows for remote code execution via improper validation of input by the HOST headers.
References
| Link | Resource |
|---|---|
| http://plone.com | Broken Link |
| http://ploneorg.com | Product |
| https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 | Exploit Third Party Advisory |
Configurations
History
02 Feb 2024, 17:05
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| References | () http://plone.com - Broken Link | |
| References | () http://ploneorg.com - Product | |
| References | () https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 - Exploit, Third Party Advisory | |
| CWE | NVD-CWE-Other | |
| CPE | cpe:2.3:a:plone:plone_docker_official_image:5.2.13:*:*:*:*:*:*:* | |
| Summary |
|
|
| First Time |
Plone
Plone plone Docker Official Image |
25 Jan 2024, 22:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-25 22:15
Updated : 2024-02-02 17:05
NVD link : CVE-2024-23055
Mitre link : CVE-2024-23055
CVE.ORG link : CVE-2024-23055
JSON object : View
Products Affected
plone
- plone_docker_official_image
CWE
