CVE-2017-1000483
high-risk
Published 2018-01-03
Accessing private content via str.format in through-the-web templates and scripts in Plone 2.5-5.1rc1. This improves an earlier hotfix. Since the format method was introduced in Python 2.6, this part of the hotfix is only relevant for Plone 4 and 5.
Do I need to act?
-
0.29% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (2)
Vendor Advisory
https://plone.org/security/hotfix/20171128/sandbox-escape
Vendor Advisory
https://plone.org/security/hotfix/20171128/sandbox-escape
53
/ 100
high-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
28/34 · Critical