CVE-2007-5741

Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:2.5.1_rc:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:2.5_beta1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2007-11-07 21:46

Updated : 2023-12-10 10:40


NVD link : CVE-2007-5741

Mitre link : CVE-2007-5741

CVE.ORG link : CVE-2007-5741


JSON object : View

Products Affected

plone

  • plone
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')