CVE-2024-23055

An issue in Plone Docker Official Image 5.2.13 (5221) open-source software allows for remote code execution via improper validation of input by the HOST headers.
References
Link Resource
http://plone.com Broken Link
http://ploneorg.com Product
https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:plone:plone_docker_official_image:5.2.13:*:*:*:*:*:*:*

History

02 Feb 2024, 17:05

Type Values Removed Values Added
CPE cpe:2.3:a:plone:plone_docker_official_image:5.2.13:*:*:*:*:*:*:*
First Time Plone plone Docker Official Image
Plone
Summary
  • (es) Un problema en el software de código abierto Plone Docker Official Image 5.2.13 (5221) permite la ejecución remota de código mediante una validación incorrecta de la entrada por parte de los encabezados HOST.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References () http://plone.com - () http://plone.com - Broken Link
References () http://ploneorg.com - () http://ploneorg.com - Product
References () https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 - () https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055 - Exploit, Third Party Advisory
CWE NVD-CWE-Other

25 Jan 2024, 22:18

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-25 22:15

Updated : 2024-02-02 17:05


NVD link : CVE-2024-23055

Mitre link : CVE-2024-23055

CVE.ORG link : CVE-2024-23055


JSON object : View

Products Affected

plone

  • plone_docker_official_image