Various Plone hotfixes, 2016-08-30
Project description
Plone hotfix, 2016-08-30
This hotfix fixes several security issues:
An attacker could bypass Plone’s security method to check if a url is a valid, safe url on the site which can lead to XSS attacks on certain pages.
In multiple places, Plone blindly uses the referer header to redirect a user to the next page after a particular action. An attacker could utilize this to draw a user into a redirection attack.
z3c.form will currently accept data from GET requests when the form is supposed to be POST. This allows a user to inject a potential XSS attack into a form, which when saved, will cause a XSS attack. Moreover, with certain widgets in Plone admin forms, the input is expected to be safe and can cause a reflexive XSS attack.
Fixes XSS on user information page.
Fixes XSS on multiple ZMI pages
By using relative paths and guessing locations on a server Plone is installed on, an attacker can read data from a target server that the process running Plone has permission to read. The attacker needs administrator privileges on the Plone site to perform this attack.
This hotfix should be applied to the following versions of Plone:
Plone 5.0.6 and any earlier 5.x version
Plone 4.3.11 and any earlier 4.x version
Any older version of Plone
The hotfix is officially supported by the Plone security team on the following versions of Plone in accordance with the Plone version support policy: 4.0.10, 4.1.6, 4.2.7, 4.3.11 and 5.0.6. However it has also received some testing on older versions of Plone. The fixes included here will be incorporated into subsequent releases of Plone, so Plone 4.3.12, 5.0.7 and greater should not require this hotfix.
Installation
Installation instructions can be found at https://plone.org/security/hotfix/20160830
If you are using versions of plone.protect prior to 3, the “confirm” patch is not necessary and will not successfully apply.
On default installs of Plone 4.x, the “user” patch will not successfully apply and does not need to be patched. The patch is only applied when a version of plone.app.users greater than 2 is installed.
Q&A
- Q: How can I confirm that the hotfix is installed correctly and my site is protected?
A: On startup, the hotfix will log a number of messages to the Zope event log that look like this:
2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied resource patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied confirm patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied z3c_form patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied in_portal patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied plonerootlogin patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied redirects patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied redirect_folderfactories patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied redirect_qi patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied redirectto patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied discussion patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied user patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Applied zmi patch 2016-08-30 08:46:09 INFO Products.PloneHotfix20160830 Hotfix installed
The exact number of patches applied, will differ depending on what packages you are using. If a patch is attempted but fails, it will be logged as a warning that says “Could not apply”. This may indicate that you have a non-standard Plone installation.
- Q: How can I report problems installing the patch?
A: Contact the Plone security team at security@plone.org, or visit the #plone channel on freenode IRC.
- Q: How can I report other potential security vulnerabilities?
A: Please email the security team at security@plone.org rather than discussing potential security issues publicly.
Changelog
1.0 (2016-08-30)
Initial release
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Hashes for Products.PloneHotfix20160830-1.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | ea73a8345cc5e36f6c4adec2c54a0ec23416fe9eda99e535af92c6e78f2c5c67 |
|
MD5 | b403088bf99c533e274b6b46e9c92dd8 |
|
BLAKE2b-256 | 9213d7371cf730ac1d131366f192963cce900f9a7a61d92f4896ee594240a986 |