Vulnerability Description
The object manager implementation (objectmanager.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly restrict access to internal methods, which allows remote attackers to obtain sensitive information via a crafted request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Plone | Plone | 4.3 |
Related Weaknesses (CWE)
References
- http://plone.org/products/plone-hotfix/releases/20130618Patch
- http://plone.org/products/plone/security/advisories/20130618-announcementVendor Advisory
- http://seclists.org/oss-sec/2013/q3/261
- https://bugzilla.redhat.com/show_bug.cgi?id=978475
- http://plone.org/products/plone-hotfix/releases/20130618Patch
- http://plone.org/products/plone/security/advisories/20130618-announcementVendor Advisory
- http://seclists.org/oss-sec/2013/q3/261
- https://bugzilla.redhat.com/show_bug.cgi?id=978475
FAQ
What is CVE-2013-4196?
CVE-2013-4196 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The object manager implementation (objectmanager.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly restrict access to internal methods, which allows remote a...
How severe is CVE-2013-4196?
CVE-2013-4196 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4196?
Check the references section above for vendor advisories and patch information. Affected products include: Plone Plone.