{
"info": {
"author": "Plone Security Team",
"author_email": "security@plone.org",
"bugtrack_url": null,
"classifiers": [
"Framework :: Plone",
"Framework :: Plone :: 4.0",
"Framework :: Plone :: 4.1",
"Framework :: Plone :: 4.2",
"Framework :: Plone :: 4.3",
"Framework :: Plone :: 5.0",
"Framework :: Plone :: 5.1",
"Programming Language :: Python",
"Programming Language :: Python :: 2.6",
"Programming Language :: Python :: 2.7"
],
"description": "Plone hotfix, 2017-11-28\n========================\n\nThis hotfix fixes several security issues:\n\n- An open redirection and reflected Cross Site Scripting attack (XSS) on the login form and possibly other places where redirects are done.\n The ``isURLInPortal`` check that is done to avoid linking to an external site could be tricked into accepting malicious links.\n\n- An open redirection when calling a specific url.\n\n- Cross Site Scripting using the ``home_page`` member property.\n\n- Accessing private content via ``str.format`` in through-the-web templates and scripts.\n See this `blog post by Armin Ronacher `_ for the general idea.\n This improves an earlier hotfix.\n Since the ``format`` method was introduced in Python 2.6, this part of the hotfix is only relevant for Plone 4 and 5, not Plone 3.\n\n\nCompatibility\n=============\n\nThis hotfix should be applied to the following versions of Plone:\n\n* Plone 5.0.9 and any earlier 5.x version\n* Plone 4.3.15 and any earlier 4.x version\n\nThe hotfix is officially supported by the Plone security team on the\nfollowing versions of Plone in accordance with the Plone\n`version support policy `_: 4.0.10, 4.1.6, 4.2.7, 4.3.15 and 5.0.9.\nHowever it has also received some testing on older versions of Plone, for example earlier 4.3 versions.\nThe fixes included here will be incorporated into subsequent releases of Plone,\nso Plone 4.3.16, 5.0.10 and greater should not require this hotfix.\n\n.. warning::\n\n Technically, the hotfix should work on Plone 3, although the ``str.format`` part is not necessary there.\n But it gets ever more difficult to test, because the outdated and unsupported Python version 2.4 is needed.\n More and more parts required during installation of Plone (buildout, setuptools) just don't work anymore with Python 2.4.\n Getting compatible versions installed and running is tough, and may be impossible unless you are an expert.\n **If you are using Plone 3 and Python 2.4 you need to upgrade soon.**\n Plone 3 was already officially unsupported, but now the Plone Security Team is really giving up.\n\nInstallation\n============\n\nInstallation instructions can be found at\nhttps://plone.org/security/hotfix/20171128\n\n.. note::\n\n You may get an error when running buildout::\n\n Error: Couldn't find a distribution for 'Products.PloneHotfix20171128==1.0'.\n\n The most likely cause is that your buildout is trying to download the hotfix via http.\n You should use the https PyPI index.\n In the buildout section of your buildout, make sure you use the correct index::\n\n [buildout]\n index = https://pypi.python.org/simple/\n\n\nQ&A\n===\n\nQ: How can I confirm that the hotfix is installed correctly and my site is protected?\n A: On startup, the hotfix will log a number of messages to the Zope event log\n that look like this::\n\n 2017-11-28 08:42:11 INFO Products.PloneHotfix20171128 Applied in_portal patch\n 2017-11-28 08:42:11 INFO Products.PloneHotfix20171128 Hotfix installed\n\n The exact number of patches applied, will differ depending on what packages you are using.\n If a patch is attempted but fails, it will be logged as a warning that says\n \"Could not apply\". This may indicate that you have a non-standard Plone\n installation.\n\nQ: How can I report problems installing the patch?\n A: Contact the Plone security team at security@plone.org, or visit the\n #plone channel on freenode IRC.\n\nQ: How can I report other potential security vulnerabilities?\n A: Please email the security team at security@plone.org rather than discussing\n potential security issues publicly.\n\nChangelog\n=========\n\n1.0 (2017-11-28)\n----------------\n\n- Initial release",
"description_content_type": null,
"docs_url": null,
"download_url": "",
"downloads": {
"last_day": -1,
"last_month": -1,
"last_week": -1
},
"home_page": "https://github.com/plone",
"keywords": "plone security hotfix patch",
"license": "GPL",
"maintainer": "",
"maintainer_email": "",
"name": "Products.PloneHotfix20171128",
"package_url": "https://pypi.org/project/Products.PloneHotfix20171128/",
"platform": "",
"project_url": "https://pypi.org/project/Products.PloneHotfix20171128/",
"project_urls": {
"Homepage": "https://github.com/plone"
},
"release_url": "https://pypi.org/project/Products.PloneHotfix20171128/1.0/",
"requires_dist": null,
"requires_python": "",
"summary": "Various Plone hotfixes, 2017-11-28",
"version": "1.0"
},
"last_serial": 3630433,
"releases": {
"1.0": [
{
"comment_text": "",
"digests": {
"md5": "baa3cc95cd297f9aeda387d0c8553292",
"sha256": "b4f310edfd2da1d99c9e26c80b5913604ea860f00f53aca4f93799d3d7ee3280"
},
"downloads": -1,
"filename": "Products.PloneHotfix20171128-1.0.tar.gz",
"has_sig": false,
"md5_digest": "baa3cc95cd297f9aeda387d0c8553292",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 13107,
"upload_time": "2017-11-28T15:02:16",
"url": "https://files.pythonhosted.org/packages/fd/ea/9e0248bbd9fb10fc9e671c90eb6b190c00fa0f9208858ee61d3019fc322a/Products.PloneHotfix20171128-1.0.tar.gz"
}
]
},
"urls": [
{
"comment_text": "",
"digests": {
"md5": "baa3cc95cd297f9aeda387d0c8553292",
"sha256": "b4f310edfd2da1d99c9e26c80b5913604ea860f00f53aca4f93799d3d7ee3280"
},
"downloads": -1,
"filename": "Products.PloneHotfix20171128-1.0.tar.gz",
"has_sig": false,
"md5_digest": "baa3cc95cd297f9aeda387d0c8553292",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 13107,
"upload_time": "2017-11-28T15:02:16",
"url": "https://files.pythonhosted.org/packages/fd/ea/9e0248bbd9fb10fc9e671c90eb6b190c00fa0f9208858ee61d3019fc322a/Products.PloneHotfix20171128-1.0.tar.gz"
}
]
}