Zope@4.4 vulnerabilities

Zope application server / web framework

Direct Vulnerabilities

Known vulnerabilities in the Zope package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

Zope is a Zope application server / web framework

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in the title property. An attacker can store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI) by exploiting the fact that the title property is displayed unquoted in the breadcrumbs element.

Note:

This is only exploitable if Manager users can edit and view Zope objects in the Zope Management Interface.

Mitigation: This vulnerability can be mitigated by ensuring only Manager users can edit and view Zope objects in the Zope Management Interface, which is the default configuration.

How to fix Cross-site Scripting (XSS)?

Upgrade Zope to version 4.8.11, 5.8.6 or higher.

[,4.8.11) [5.0a1,5.8.6)
  • L
Cross-site Scripting (XSS)

Zope is a Zope application server / web framework

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when the image upload function is used. An attacker can inject malicious code into SVG images and trick a user into following a specially crafted link.

Note: This is only exploitable if untrusted users are allowed to upload images.

How to fix Cross-site Scripting (XSS)?

Upgrade Zope to version 4.8.10, 5.8.5 or higher.

[,4.8.10) [5.0a1,5.8.5)
  • H
Remote Code Execution (RCE)

Zope is a Zope application server / web framework

Affected versions of this package are vulnerable to Remote Code Execution (RCE). The optional add-on package Products.PythonScripts adds Script (Python) to the list of content items a user can add to the Zope object database. Inside these scripts users can write Python code that is executed when rendered through the web. The code environment in these script objects is limited, it relies on the RestrictedPython package to provide a "safe" subset of Python instructions as well as the AccessControl package that defines security policies for execution in the context of a Zope application.

Recently the AccessControl package was updated to fix a remote code execution security issue. A link to the security advisory is provided in the References section below. The bug tightens the AccessControl security policies for Zope by blocking access to unsafe classes inside the Python string module.

You are only affected if the following are true:

  • You use Python 3 for your Zope deployment (Zope 4 on Python 2 is not affected)
  • You run Zope 4 below version 4.6.3 or Zope 5 below version 5.3
  • You have installed the optional Products.PythonScripts add-on package

By default, you need to have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk.

How to fix Remote Code Execution (RCE)?

Upgrade Zope to version 4.6.3, 5.3 or higher.

[4.0,4.6.3) [5.0,5.3)
  • H
Arbitrary Code Execution

Zope is a Zope application server / web framework

Affected versions of this package are vulnerable to Arbitrary Code Execution via traversal in TAL expressions.

By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk.

This extends a previous advisory with more cases of TAL expression traversal vulnerabilities.

How to fix Arbitrary Code Execution?

Upgrade Zope to version 4.6.1, 5.2.1 or higher.

[,4.6.1) [5.0,5.2.1)
  • M
Remote Code Execution (RCE)

Zope is a Zope application server / web framework

Affected versions of this package are vulnerable to Remote Code Execution (RCE). Users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability.

How to fix Remote Code Execution (RCE)?

Upgrade Zope to version 5.2, 4.6 or higher.

[5.0,5.2) [,4.6)