Safety vulnerability ID: 41254
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Plone.app.event 4.0.0a4 includes a fix for a server-side-request-forgery vulnerability. Now, "file:" protocol is not allowed in iCal url. Previously, only "file://" was disallowed, but this left room for relative paths.
https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-event-ical-url
https://github.com/plone/plone.app.event/commit/70bf81822240d2808e6e9d3538586f78f4cd91bf
Latest version: 3.2.14
The Plone calendar framework
--------------------
Bug fixes:
- Do not allow ``file:`` protocol in ical url.
Previously, only ``file://`` was disallowed, but this left room for relative paths.
Taken over from `PloneHotfix20210518 <https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-event-ical-url>`_.
[maurits] (3274)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application