CVE-2023-42457

plone.rest allows users to use HTTP verbs such as GET, POST, PUT, DELETE, etc. in Plone. Starting in the 2.x branch and prior to versions 2.0.1 and 3.0.1, when the `++api++` traverser is accidentally used multiple times in a url, handling it takes increasingly longer, making the server less responsive. Patches are available in `plone.rest` 2.0.1 and 3.0.1. Series 1.x is not affected. As a workaround, one may redirect `/++api++/++api++` to `/++api++` in one's frontend web server (nginx, Apache).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:plone:rest:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:plone:rest:3.0.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-09-21 15:15

Updated : 2023-09-25 18:53


NVD link : CVE-2023-42457

Mitre link : CVE-2023-42457

CVE.ORG link : CVE-2023-42457


JSON object : View

Products Affected

plone

  • rest
CWE
CWE-770

Allocation of Resources Without Limits or Throttling

CWE-400

Uncontrolled Resource Consumption