CVE-2013-4191: Plone is vulnerable to Information Exposure when generating zip archives
4.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53619%
CWE
Published
5/17/2022
Updated
10/15/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
plone | pip | >= 2.1, <= 4.1 | 4.1.1 |
plone | pip | >= 4.2, < 4.2.6 | 4.2.6 |
plone | pip | >= 4.3, < 4.3.2 | 4.3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly references zip.py
as the source of improper access control enforcement. While the exact function name isn't specified in available documentation, Plone's zip generation logic in affected versions resides in Products/CMFPlone/utils.py
(commonly imported as 'zip'). The core failure occurs in the archive generation workflow where content inclusion lacked proper permission validation. Multiple independent sources (CVE description, Red Hat bugzilla, Plone security advisory) all confirm the vulnerability stems from zip archive generation logic without adequate access checks, strongly indicating the primary zip generation function is responsible.