CVE-2021-33926

An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3, 5.1b2, 5.1a2, 5.1a1, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.2, 5.1.1 5.1, 5.0rc3, 5.0rc2, 5.0rc1, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.10, 5.0.1, 5.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.20, 4 allows attacker to access sensitive information via the RSS feed protlet.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.12:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.14:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.15:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.17:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.18:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.19:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.20:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:-:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1:alpha2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.7:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1a1:alpha1:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1a2:beta4:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1b2:beta3:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1b3:beta2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1b4:rc2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1rc1:rc1:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1rc2:-:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.4:*:*:*:*:*:*:*

History

21 Nov 2024, 06:09

Type Values Removed Values Added
References () https://github.com/s-kustm/Subodh/blob/master/Plone%205.2.4%20Vulnerable%20to%20bilend%20SSRF.pdf - Exploit, Third Party Advisory () https://github.com/s-kustm/Subodh/blob/master/Plone%205.2.4%20Vulnerable%20to%20bilend%20SSRF.pdf - Exploit, Third Party Advisory
References () https://plone.org/security/hotfix/20210518 - Release Notes () https://plone.org/security/hotfix/20210518 - Release Notes
References () https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url - Vendor Advisory () https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url - Vendor Advisory

02 Mar 2023, 15:04

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-918
CPE cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1b2:beta3:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1rc1:rc1:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.7:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.14:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.19:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.20:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1a2:beta4:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.15:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1b4:rc2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.12:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.18:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1b3:beta2:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1rc2:-:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1a1:alpha1:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.17:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0:-:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:plone:plone:5.1:alpha2:*:*:*:*:*:*
References (MISC) https://github.com/s-kustm/Subodh/blob/master/Plone%205.2.4%20Vulnerable%20to%20bilend%20SSRF.pdf - (MISC) https://github.com/s-kustm/Subodh/blob/master/Plone%205.2.4%20Vulnerable%20to%20bilend%20SSRF.pdf - Exploit, Third Party Advisory
References (MISC) https://plone.org/security/hotfix/20210518 - (MISC) https://plone.org/security/hotfix/20210518 - Release Notes
References (MISC) https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url - (MISC) https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url - Vendor Advisory

17 Feb 2023, 19:07

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-17 18:15

Updated : 2025-03-19 15:15


NVD link : CVE-2021-33926

Mitre link : CVE-2021-33926

CVE.ORG link : CVE-2021-33926


JSON object : View

Products Affected

plone

  • plone
CWE
CWE-918

Server-Side Request Forgery (SSRF)