diff options
| author | CoprDistGit <infra@openeuler.org> | 2023-05-29 10:40:40 +0000 |
|---|---|---|
| committer | CoprDistGit <infra@openeuler.org> | 2023-05-29 10:40:40 +0000 |
| commit | 3ea052c8c01299407aa22986f167ae96d0a0b024 (patch) | |
| tree | 2607346175c2a0a5b598b2c67a662c1e2a72d3b6 | |
| parent | 33f2f7d05b31f105c2213a0565d8435086ab4d0d (diff) | |
automatic import of python-products-plonehotfix20210518
| -rw-r--r-- | .gitignore | 1 | ||||
| -rw-r--r-- | python-products-plonehotfix20210518.spec | 166 | ||||
| -rw-r--r-- | sources | 1 |
3 files changed, 168 insertions, 0 deletions
@@ -0,0 +1 @@ +/Products.PloneHotfix20210518-1.6.tar.gz diff --git a/python-products-plonehotfix20210518.spec b/python-products-plonehotfix20210518.spec new file mode 100644 index 0000000..d280fbc --- /dev/null +++ b/python-products-plonehotfix20210518.spec @@ -0,0 +1,166 @@ +%global _empty_manifest_terminate_build 0 +Name: python-Products.PloneHotfix20210518 +Version: 1.6 +Release: 1 +Summary: Various Plone hotfixes, 2021-05-18 +License: GPL +URL: https://plone.org/security/hotfix/20210518 +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/84/82/4cbd7bab685000b7a4df20745886f752cbece8bb2dcc5ceede9ba2a0ef62/Products.PloneHotfix20210518-1.6.tar.gz +BuildArch: noarch + +Requires: python3-setuptools + +%description +This hotfix fixes several security issues: +- Remote Code Execution via traversal in expressions via aliases. + Reported by David Miller. +- Remote Code Execution via traversal in expressions (no aliases). + Reported by Calum Hutton. +- Remote Code Execution via traversal in expressions via string formatter. + Reported by David Miller. +- Writing arbitrary files via docutils and Python Script. + Reported by Calum Hutton. +- Stored XSS from file upload (svg, html). + Reported separately by Emir Cüneyt Akkutlu and Tino Kautschke. +- XSS vulnerability in CMFDiffTool. + Reported by Igor Margitich. +- Reflected XSS in various spots. + Reported by Calum Hutton. +- Various information disclosures: GS, QI, all_users. + Reported by Calum Hutton. +- Stored XSS from user fullname. + Reported by Tino Kautschke. +- Blind SSRF via feedparser accessing an internal URL. + Reported by Subodh Kumar Shree. +- Server Side Request Forgery via event ical URL. + Reported by MisakiKata and David Miller. +- Server Side Request Forgery via lxml parser. + Reported by MisakiKata and David Miller. +- XSS in folder contents on Plone 5.0 and higher. + Reported by Matt Moreschi. + Only included since version 1.5 of the hotfix. +- Remote Code Execution via Python Script. + Reported by Calum Hutton. + Only Plone 5.2 on Python 3 is vulnerable. + Only included since version 1.6 of the hotfix. + +%package -n python3-Products.PloneHotfix20210518 +Summary: Various Plone hotfixes, 2021-05-18 +Provides: python-Products.PloneHotfix20210518 +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-Products.PloneHotfix20210518 +This hotfix fixes several security issues: +- Remote Code Execution via traversal in expressions via aliases. + Reported by David Miller. +- Remote Code Execution via traversal in expressions (no aliases). + Reported by Calum Hutton. +- Remote Code Execution via traversal in expressions via string formatter. + Reported by David Miller. +- Writing arbitrary files via docutils and Python Script. + Reported by Calum Hutton. +- Stored XSS from file upload (svg, html). + Reported separately by Emir Cüneyt Akkutlu and Tino Kautschke. +- XSS vulnerability in CMFDiffTool. + Reported by Igor Margitich. +- Reflected XSS in various spots. + Reported by Calum Hutton. +- Various information disclosures: GS, QI, all_users. + Reported by Calum Hutton. +- Stored XSS from user fullname. + Reported by Tino Kautschke. +- Blind SSRF via feedparser accessing an internal URL. + Reported by Subodh Kumar Shree. +- Server Side Request Forgery via event ical URL. + Reported by MisakiKata and David Miller. +- Server Side Request Forgery via lxml parser. + Reported by MisakiKata and David Miller. +- XSS in folder contents on Plone 5.0 and higher. + Reported by Matt Moreschi. + Only included since version 1.5 of the hotfix. +- Remote Code Execution via Python Script. + Reported by Calum Hutton. + Only Plone 5.2 on Python 3 is vulnerable. + Only included since version 1.6 of the hotfix. + +%package help +Summary: Development documents and examples for Products.PloneHotfix20210518 +Provides: python3-Products.PloneHotfix20210518-doc +%description help +This hotfix fixes several security issues: +- Remote Code Execution via traversal in expressions via aliases. + Reported by David Miller. +- Remote Code Execution via traversal in expressions (no aliases). + Reported by Calum Hutton. +- Remote Code Execution via traversal in expressions via string formatter. + Reported by David Miller. +- Writing arbitrary files via docutils and Python Script. + Reported by Calum Hutton. +- Stored XSS from file upload (svg, html). + Reported separately by Emir Cüneyt Akkutlu and Tino Kautschke. +- XSS vulnerability in CMFDiffTool. + Reported by Igor Margitich. +- Reflected XSS in various spots. + Reported by Calum Hutton. +- Various information disclosures: GS, QI, all_users. + Reported by Calum Hutton. +- Stored XSS from user fullname. + Reported by Tino Kautschke. +- Blind SSRF via feedparser accessing an internal URL. + Reported by Subodh Kumar Shree. +- Server Side Request Forgery via event ical URL. + Reported by MisakiKata and David Miller. +- Server Side Request Forgery via lxml parser. + Reported by MisakiKata and David Miller. +- XSS in folder contents on Plone 5.0 and higher. + Reported by Matt Moreschi. + Only included since version 1.5 of the hotfix. +- Remote Code Execution via Python Script. + Reported by Calum Hutton. + Only Plone 5.2 on Python 3 is vulnerable. + Only included since version 1.6 of the hotfix. + +%prep +%autosetup -n Products.PloneHotfix20210518-1.6 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-Products.PloneHotfix20210518 -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Mon May 29 2023 Python_Bot <Python_Bot@openeuler.org> - 1.6-1 +- Package Spec generated @@ -0,0 +1 @@ +d4474940842e9d50aa0d0b64263ba4f8 Products.PloneHotfix20210518-1.6.tar.gz |
