Plone spamProtect mailaddress Parameter XSS

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a Python script that is affected by a
cross-site scripting vulnerability.

Description :

The version of Plone installed on the remote web server is affected
by a cross-site scripting vulnerability because it fails to properly
sanitize input to the 'mailaddress' parameter of the 'spamProtect.py'
script. An attacker may be able to leverage this to inject arbitrary
HTML and script code into a user's browser to be executed within the
security context of the affected site.

Note that the application is also reportedly affected by several
additional vulnerabilities. Some of the reported vulnerabilities
include but are not limited to arbitrary code execution, privilege
escalation, denial of service (DoS), open redirect, cross-site
scripting, as well as several additional flaws
however, Nessus has
not tested for the additional issues.

See also :

http://www.nessus.org/u?05118bde
http://seclists.org/oss-sec/2013/q3/258
http://plone.org/products/plone-hotfix/releases/20130618

Solution :

Follow the instructions in the advisory to apply the hotfix.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:U/RC:C)
Public Exploit Available : false

Family: CGI abuses : XSS

Nessus Plugin ID: 67205 ()

Bugtraq ID: 60339
61544

CVE ID: CVE-2013-4190