[<prev] [next>] [day] [month] [year] [list]
Message-ID: <47D9653F.1060808@procheckup.com>
Date: Thu, 13 Mar 2008 17:32:47 +0000
From: ProCheckUp Research <research@...checkup.com>
To: bugtraq@...urityfocus.com
Subject: PR08-02: Plone CMS Security Research - the Art of Plowning
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
PR08-02: Plone CMS Security Research: the Art of Plowning
Product description:
Plone is a ready-to-run content management system built on the powerful,
and free, Zope application server. Plone is easy to set up, extremely
flexible, and provides you with a system for managing web content that
is ideal for project groups, communities, web sites, extranets and
intranets.
Plone is designed with security in mind by addressing the 10 most common
security vulnerabilities in web applications (OWASP Top 10).
Summary of issues identified:
- - CSRF (Cross-site Request Forgeries)
- - Credentials (username and password) stored in cookies
- - Lack of authentication state on the server side
- - Session cookies never, ever change (even after user password is
changed or user logs out!)
Full details can be found here:
http://www.procheckup.com/Hacking_Plone_CMS.pdf
Legal:
Copyright 2008 Procheckup Ltd. All rights reserved.
Permission is granted for copying and circulating this Bulletin to the
Internet community for the purpose of alerting them to problems, if and
only if, the Bulletin is not edited or changed in any way, is attributed
to Procheckup, and provided such reproduction and/or distribution is
performed for non-commercial purposes. Any other use of this information
is prohibited. Procheckup is not liable for any misuse of this
information by any third party.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFH2WU/oR/Hvsj3i8sRAp3QAKChs5weInnTWxCN7oAzw2aVXr7r7wCdFoFx
gB4JS+FXYGsW9fPGASWs17s=
=QTdK
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists