{"id":"CVE-2021-33510","details":"Plone through 5.2.4 allows remote authenticated managers to conduct SSRF attacks via an event ical URL, to read one line of a file.","aliases":["GHSA-4mg4-wvmx-5332","PYSEC-2021-82"],"modified":"2026-05-18T05:55:15.276668400Z","published":"2021-05-21T22:15:08.567Z","database_specific":{},"references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/05/22/1"},{"type":"ADVISORY","url":"https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-event-ical-url"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/plone/plone","events":[{"introduced":"0"},{"last_affected":"d5b50de9c17faac5051d06141bd12cd3e40af8e8"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"5.2.4"}]}}],"versions":["5.2.4","5.2.3","5.2.2","5.2.1","5.2.0","5.2rc5","5.2rc4","5.2rc3","5.2rc2","5.2rc1","5.2b1","5.2a2","5.2a1","5.1rc1","5.1b4","5.1b3","5.1b2","5.1b1","5.1a2","5.1a1","5.0.2","5.0.1","5.0","5.0rc3","5.0rc2","5.0rc1","5.0b4","5.0b3","5.0b1","5.0a3","5.0a2","4.3.1","4.3","4.3b2","4.3b1","4.3a2","4.3a1","4.2b2","4.2b1","4.1.0","4.2a2","4.2a1","4.1rc3","4.1rc2","4.1rc1","4.1b2","4.1b1","4.1a3","4.1a2","4.1a1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-33510.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}