Safety vulnerability ID: 61347
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Plone.rest allows users to use HTTP verbs such as GET, POST, PUT, DELETE, etc. in Plone. Starting in the 2.x branch and prior to versions 2.0.1 and 3.0.1, when the `++api++` traverser is accidentally used multiple times in a url, handling it takes increasingly longer, making the server less responsive. Patches are available in `plone.rest` 2.0.1 and 3.0.1. Series 1.x is not affected. As a workaround, one may redirect `/++api++/++api++` to `/++api++` in one's frontend web server (nginx, Apache).
Latest version: 5.0.0
Plone support for HTTP verbs.
------------------
Bug fixes:
- When ``++api++`` is in the url multiple times, redirect to the proper url.
When the url is badly formed, for example ``++api++/something/++api++``, give a 404 NotFound.
Fixes a denial of service.
See `security advisory <https://github.com/plone/plone.rest/security/advisories/GHSA-h6rp-mprm-xgcq>`_.
[maurits] (1)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application