Description Preview
Overview
CVE-2017-1000484 is an open redirection vulnerability (CWE-601) affecting Plone versions 2.5 through 5.1rc1. The vulnerability exists in a specific URL endpoint that improperly validates redirect parameters. This allows attackers to craft links that appear to lead to legitimate Plone sites but ultimately redirect users to malicious websites. The most concerning attack scenario involves chaining this vulnerability with social engineering to capture user credentials. In this scenario, users are directed to authenticate on the legitimate Plone login form, but after successful authentication, they are redirected to the attacker's site, potentially without realizing they've left the trusted domain.
Remediation
To address this vulnerability, administrators should:
- Update to a patched version of Plone (after 5.1rc1)
- Apply the security hotfix 20171128 provided by Plone
- If immediate patching is not possible, implement URL filtering at the web application firewall level to block requests with suspicious redirect parameters
- Consider implementing Content Security Policy (CSP) headers to restrict which domains can be loaded
- Educate users about the risks of clicking on untrusted links, especially those with complex URLs containing redirect parameters
References
- Plone Security Advisory: https://plone.org/security/hotfix/20171128/an-open-redirection-when-calling-a-specific-url
- CWE-601: URL Redirection to Untrusted Site ('Open Redirect'): https://cwe.mitre.org/data/definitions/601.html
- OWASP Open Redirect Prevention Cheat Sheet: https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade