CVE-2021-3313

Plone CMS until version 5.2.4 has a stored Cross-Site Scripting (XSS) vulnerability in the user fullname property and the file upload functionality. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript in the context of the victim's browser if the victim opens a vulnerable page containing an XSS payload.
Configurations

Configuration 1 (hide)

cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*

History

25 May 2021, 19:01

Type Values Removed Values Added
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 5.4
CPE cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*
References (MISC) https://plone.org/download/releases/5.2.3 - (MISC) https://plone.org/download/releases/5.2.3 - Release Notes, Vendor Advisory
References (MISC) https://www.compass-security.com/fileadmin/Research/Advisories/2021-07_CSNC-2021-013_XSS_in_Plone_CMS.txt - (MISC) https://www.compass-security.com/fileadmin/Research/Advisories/2021-07_CSNC-2021-013_XSS_in_Plone_CMS.txt - Exploit, Third Party Advisory
References (MISC) https://plone.org/security/hotfix/20210518 - (MISC) https://plone.org/security/hotfix/20210518 - Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/05/22/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/05/22/1 - Mailing List, Third Party Advisory

22 May 2021, 18:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/05/22/1 -

20 May 2021, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-20 16:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-3313

Mitre link : CVE-2021-3313

CVE.ORG link : CVE-2021-3313


JSON object : View

Products Affected

plone

  • plone
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')