{"id":"PYSEC-2020-89","details":"Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to set weak passwords, leading to easier cracking.","aliases":["CVE-2020-7940","GHSA-cw58-gpgw-hwx2"],"modified":"2023-11-01T04:53:40.492062Z","published":"2020-01-23T21:15:00Z","references":[{"type":"WEB","url":"https://plone.org/security/hotfix/20200121"},{"type":"WEB","url":"https://plone.org/security/hotfix/20200121/password-strength-checks-were-not-always-checked"},{"type":"WEB","url":"https://www.openwall.com/lists/oss-security/2020/01/22/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2020/01/24/1"}],"affected":[{"package":{"name":"plone","ecosystem":"PyPI","purl":"pkg:pypi/plone"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.3"},{"fixed":"5.2.1"}]}],"versions":["4.3","4.3.1","4.3.2","4.3.3","4.3.4","4.3.5","4.3.6","4.3.7","4.3.8","4.3.9","4.3.10","4.3.11","4.3.12","4.3.13","4.3.14","4.3.15","4.3.16","4.3.17","4.3.18","4.3.19","4.3.20","5.0a1","5.0a2","5.0a3","5.0b1","5.0b2","5.0b3","5.0b4","5.0rc1","5.0rc2","5.0rc3","5.0","5.0.1","5.0.2","5.0.3","5.0.4","5.0.5","5.0.6","5.0.7","5.0.8","5.0.9","5.0.10","5.1a1","5.1a2","5.1b1","5.1b2","5.1b3","5.1b4","5.1rc1","5.1rc2","5.1.0","5.1.1","5.1.2","5.1.3","5.1.4","5.1.5","5.1.6","5.1.7","5.2a1","5.2a2","5.2b1","5.2rc1","5.2rc2","5.2rc3","5.2rc4","5.2rc5","5.2.0"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/plone/PYSEC-2020-89.yaml"}}],"schema_version":"1.7.3"}