Show plain JSON{"id": "CVE-2013-4188", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-03-11T19:37:02.443", "references": [{"url": "http://plone.org/products/plone-hotfix/releases/20130618", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://plone.org/products/plone/security/advisories/20130618-announcement", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://seclists.org/oss-sec/2013/q3/261", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978449", "source": "secalert@redhat.com"}, {"url": "http://plone.org/products/plone-hotfix/releases/20130618", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://plone.org/products/plone/security/advisories/20130618-announcement", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/oss-sec/2013/q3/261", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978449", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-399"}]}], "descriptions": [{"lang": "en", "value": "traverser.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers with administrator privileges to cause a denial of service (infinite loop and resource consumption) via unspecified vectors related to \"retrieving information for certain resources.\""}, {"lang": "es", "value": "traverser.py en Plone 2.1 hasta 4.1, 4.2.x hasta 4.2.5 y 4.3.x hasta 4.3.1 permite a atacantes remotos con privilegios de administrador causar una denegaci\u00f3n de servicio (bucle infinito y consumo de recursos) a trav\u00e9s de vectores no especificados relacionados con \"la recuperaci\u00f3n de informaci\u00f3n para ciertos recursos.\""}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE168A35-1A46-4A6F-8A08-25CDD886066D"}, {"criteria": "cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFE0FC06-369B-46CF-9B1E-BAF7AF87E950"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08747064-EC22-40B4-92EF-4640788FE55D"}, {"criteria": "cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4EB85E3-9A76-4B79-AF7D-91484784A2EF"}, {"criteria": "cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78755057-2613-4D5E-8F59-2C117EE282B6"}, {"criteria": "cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D49359CD-63EF-4D3A-92DC-C16DEE88138B"}, {"criteria": "cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DE940BA-B784-4193-AB77-333F15B6C32D"}, {"criteria": "cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9762C674-380B-4831-BBA1-3B27742121B0"}, {"criteria": "cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D938645-80CE-4287-830E-A3BD0C5C84FB"}, {"criteria": "cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB0F7BFC-DC20-46B3-90E7-264E3A8A7886"}, {"criteria": "cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2C09C10-AEA0-41F4-B964-507B40580BE9"}, {"criteria": "cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B60568E-A688-46AF-B627-062A029A7324"}, {"criteria": "cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B635DAD-AC53-4484-8750-200B662DAFD1"}, {"criteria": "cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B647E76-E8B8-4329-8848-3B90EB262807"}, {"criteria": "cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D0A6B8F-4018-44DC-9862-45309619DC6D"}, {"criteria": "cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F10374F-2BB3-48D2-B19F-9B2D038A8E35"}, {"criteria": "cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEAC4F93-D26C-48F3-A7FF-8DC008FC2671"}, {"criteria": "cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "552661B7-093D-4B3C-8770-FCDE6032AA17"}, {"criteria": "cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5180F9D2-E44B-455D-968C-792026AC832A"}, {"criteria": "cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "636226E4-B880-41FE-A727-EF56CF8E6249"}, {"criteria": "cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF6E934A-C344-4861-8CD4-D18D52672D5C"}, {"criteria": "cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25780BBE-8013-4100-9EA8-7EFC244399A0"}, {"criteria": "cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A089ED64-07E6-4F4C-97AE-AF74269A4DB1"}, {"criteria": "cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF2334C9-9B34-4C7D-93A2-172E596E05C6"}, {"criteria": "cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "354046F4-FA55-4AFC-935A-C803D36CDE86"}, {"criteria": "cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF1496A7-6D0A-4970-B0BF-83758065BC6A"}, {"criteria": "cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47DEF57C-92F0-4999-AF8E-CEE27EE92CD6"}, {"criteria": "cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BED4241-D823-402A-A389-7E52C410E2F7"}, {"criteria": "cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE9A55E6-F265-4BB8-8683-3E0CFA01EC73"}, {"criteria": "cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "970FD910-50A4-478A-ADE6-EB912C261DAD"}, {"criteria": "cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A490523-1063-44E4-A72A-C23070279181"}, {"criteria": "cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8559F17-63D1-45DB-8A28-47F729DC6686"}, {"criteria": "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDC93803-6506-4382-A013-18010EE7E06B"}, {"criteria": "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E65977FD-A880-4D16-B56B-94A72774F42D"}, {"criteria": "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EA5B4F8-2155-403D-97D8-1272285D508B"}, {"criteria": "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3CA2943-77E5-4384-A019-415BBCE62F94"}, {"criteria": "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7FF63F6-F1DC-4A97-A2E6-11CF613A31E8"}, {"criteria": "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "538A3519-5B04-4FE5-A3C0-FD26EFA32705"}, {"criteria": "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3306D84-0F5B-46BA-9BCC-DCD0A1CDD604"}, {"criteria": "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E08F4534-A588-463F-A745-39E559AB1CB8"}, {"criteria": "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B64341BA-5722-415E-9771-9837168AB7C0"}, {"criteria": "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2929227-AE19-428D-9AC3-D312A559039B"}, {"criteria": "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B6DC866-0FEE-475B-855C-A69E004810CD"}, {"criteria": "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50BF3E8E-152C-4E89-BAA2-A952D10F4611"}, {"criteria": "cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49DB97A7-89DD-43C0-A490-84AA7069764B"}, {"criteria": "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C44B53B-953B-4522-A5B4-11573850D2CD"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F1818BB-E23A-4136-898D-1D0C80C08728"}, {"criteria": "cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CB06627-133A-40D1-8816-E31E0A9BAD22"}, {"criteria": "cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE7E448A-2C0C-4DE0-89EA-904718CB6C6D"}, {"criteria": "cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E727C5C-9E54-49F7-B92C-2492069AAE08"}, {"criteria": "cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFD68465-4CDC-4788-8932-41335B5C4AC8"}, {"criteria": "cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7B739E0-FB73-401C-AB1A-E3C1434AA2A3"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}