Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-7317
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-25 Sep, 2017 | 17:29
Updated At-20 Apr, 2025 | 01:37

Kupu 3.3.0 through 3.3.6, 4.0.0 through 4.0.10, 4.1.0 through 4.1.6, and 4.2.0 through 4.2.7 allows remote authenticated users to edit Kupu settings.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.06.8MEDIUM
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
Primary2.04.9MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:N
CPE Matches

kupu_project
kupu_project
>>kupu>>Versions up to 1.4.16(inclusive)
cpe:2.3:a:kupu_project:kupu:*:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>3.3
cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>3.3.1
cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>3.3.2
cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>3.3.3
cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>3.3.4
cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>3.3.5
cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>3.3.6
cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0
cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.1
cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.2
cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.3
cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.4
cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.5
cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.6.1
cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.7
cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.8
cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.9
cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.0.10
cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.1
cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.1.1
cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.1.2
cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.1.3
cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.1.4
cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.1.5
cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.1.6
cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.2
cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.2.1
cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.2.2
cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.2.3
cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.2.4
cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.2.5
cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.2.6
cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*
Plone Foundation
plone
>>plone>>4.2.7
cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2015/09/22/15cve@mitre.org
Mailing List
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1264799cve@mitre.org
Issue Tracking
Third Party Advisory
https://plone.org/security/hotfix/20150910cve@mitre.org
Vendor Advisory
https://plone.org/security/hotfix/20150910/privilege-escalation-in-kupucve@mitre.org
Vendor Advisory
http://www.openwall.com/lists/oss-security/2015/09/22/15af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1264799af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://plone.org/security/hotfix/20150910af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://plone.org/security/hotfix/20150910/privilege-escalation-in-kupuaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Change History
0Changes found

Details not found