Vulnerabilities > CVE-2011-3587
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute arbitrary commands via vectors related to the p_ class in OFS/misc_.py and the use of Python modules.
Vulnerable Configurations
D2sec
name | Plone RCE |
url | http://www.d2sec.com/exploits/plone_rce.html |
Exploit-Db
description | Plone and Zope Remote Command Execution PoC. CVE-2011-3587. Webapps exploits for multiple platform |
id | EDB-ID:18262 |
last seen | 2016-02-02 |
modified | 2011-12-21 |
published | 2011-12-21 |
reporter | Nick Miles |
source | https://www.exploit-db.com/download/18262/ |
title | Plone and Zope Remote Command Execution PoC |
Metasploit
description | Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute arbitrary commands via vectors related to the p_ class in OFS/misc_.py and the use of Python modules. |
id | MSF:EXPLOIT/MULTI/HTTP/PLONE_POPEN2 |
last seen | 2020-06-10 |
modified | 2017-07-24 |
published | 2011-12-27 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/plone_popen2.rb |
title | Plone and Zope XMLTools Remote Command Execution |
Nessus
NASL family | CGI abuses |
NASL id | PLONE_20110928.NASL |
description | The version of Plone hosted on the remote web server has a flaw that allows arbitrary access to Python modules. Using a specially crafted URL, this can allow an unauthenticated, remote attacker the ability to run arbitrary commands on the system through the Python |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 57350 |
published | 2011-12-20 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/57350 |
title | Plone Request Parsing Remote Command Execution |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/108071/plonezope-exec.txt id PACKETSTORM:108071 last seen 2016-12-05 published 2011-12-21 reporter Nick Miles source https://packetstormsecurity.com/files/108071/Plone-Zope-Remote-Command-Execution.html title Plone / Zope Remote Command Execution data source https://packetstormsecurity.com/files/download/108200/plone_popen2.rb.txt id PACKETSTORM:108200 last seen 2016-12-05 published 2011-12-28 reporter TecR0c source https://packetstormsecurity.com/files/108200/Plone-and-Zope-Remote-CMD-Injection-Exploit.html title Plone and Zope Remote CMD Injection Exploit
Saint
bid | 49857 |
description | Plone Zope SAXutils Command Execution |
osvdb | 76105 |
title | plone_zope_saxutils_cmd_exec |
type | remote |
Seebug
bulletinFamily exploit description BUGTRAQ ID: 49857 CVE ID: CVE-2011-3587 Zope是一个开源的web应用服务器,主要用python写成 Zope在实现上存在远程命令执行漏洞,非法攻击者可利用此漏洞部署特制的Web请求并以Zope/Plone服务权限执行任意命令 0 Zope 2.13.9 Zope 2.13.8 Zope 2.13 Zope 2.12.19 Zope 2.12 Plone 4.x 厂商补丁: Zope ---- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.zope.org/ id SSV:26110 last seen 2017-11-19 modified 2011-12-26 published 2011-12-26 reporter Root source https://www.seebug.org/vuldb/ssvid-26110 title Zope框架"cmd"参数远程命令执行漏洞 bulletinFamily exploit description BUGTRAQ ID: 49857 CVE ID: CVE-2011-3587 Zope是一个开源的web应用服务器,主要用python写成 Zope在实现上存在远程命令执行漏洞,非法攻击者可利用此漏洞部署特制的Web请求并以Zope/Plone服务权限执行任意命令 0 Zope 2.13.9 Zope 2.13.8 Zope 2.13 Zope 2.12.19 Zope 2.12 Plone 4.x 厂商补丁: Zope ---- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.zope.org/ id SSV:72431 last seen 2017-12-25 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-72431 title Plone and Zope Remote Command Execution PoC
References
- https://bugzilla.redhat.com/show_bug.cgi?id=742297
- http://zope2.zope.org/news/security-vulnerability-announcement-cve-2011-3587
- http://plone.org/products/plone-hotfix/releases/20110928/PloneHotfix20110928-1.0.zip
- http://pypi.python.org/pypi/Products.PloneHotfix20110928/1.0
- http://plone.org/products/plone/security/advisories/20110928
- http://secunia.com/advisories/46221
- http://plone.org/products/plone-hotfix/releases/20110928
- http://secunia.com/advisories/46323