Zope@4.0b6 vulnerabilities

Zope application server / web framework

Direct Vulnerabilities

Known vulnerabilities in the Zope package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

Zope is a Zope application server / web framework

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in the title property. An attacker can store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI) by exploiting the fact that the title property is displayed unquoted in the breadcrumbs element.

Note:

This is only exploitable if Manager users can edit and view Zope objects in the Zope Management Interface.

Mitigation: This vulnerability can be mitigated by ensuring only Manager users can edit and view Zope objects in the Zope Management Interface, which is the default configuration.

How to fix Cross-site Scripting (XSS)?

Upgrade Zope to version 4.8.11, 5.8.6 or higher.

[,4.8.11) [5.0a1,5.8.6)
  • L
Cross-site Scripting (XSS)

Zope is a Zope application server / web framework

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when the image upload function is used. An attacker can inject malicious code into SVG images and trick a user into following a specially crafted link.

Note: This is only exploitable if untrusted users are allowed to upload images.

How to fix Cross-site Scripting (XSS)?

Upgrade Zope to version 4.8.10, 5.8.5 or higher.

[,4.8.10) [5.0a1,5.8.5)
  • H
Arbitrary Code Execution

Zope is a Zope application server / web framework

Affected versions of this package are vulnerable to Arbitrary Code Execution via traversal in TAL expressions.

By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk.

This extends a previous advisory with more cases of TAL expression traversal vulnerabilities.

How to fix Arbitrary Code Execution?

Upgrade Zope to version 4.6.1, 5.2.1 or higher.

[,4.6.1) [5.0,5.2.1)
  • M
Remote Code Execution (RCE)

Zope is a Zope application server / web framework

Affected versions of this package are vulnerable to Remote Code Execution (RCE). Users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability.

How to fix Remote Code Execution (RCE)?

Upgrade Zope to version 5.2, 4.6 or higher.

[5.0,5.2) [,4.6)