zope2@2.13.2 vulnerabilities

Zope application server / web framework

  • latest version

    4.0

  • latest non vulnerable version

  • first published

    15 years ago

  • latest version published

    5 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the zope2 package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    HTTP Header Injection

    zope2 is a Zope2 application server / web framework Affected versions of this package are vulnerable to HTTP header Injection attacks due to incorrectly escaping of Carriage Return and Line Feed (CR/LF) characters in HTTP requests.

    [2.13,2.13.25)
    • M
    Privilege Escalation

    zope2 is a Zope2 application server / web framework Multiple unspecified vulnerabilities in (1) dataitems.py, (2) get.py, and (3) traverseName.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote authenticated users with administrator access to a subtree to access nodes above the subtree via unknown vectors.

    [2.13,2.13.13)
    • M
    Cross-site Scripting (XSS)

    zope2 is a Zope2 application server / web framework Multiple cross-site scripting (XSS) vulnerabilities in (1) spamProtect.py, (2) pts.py, and (3) request.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

    [2.12,2.12.28)[2.13,2.13.21)
    • M
    Open Redirect

    zope2 is a Zope2 application server / web framework Multiple open redirect vulnerabilities in (1) marmoset_patch.py, (2) publish.py, and (3) principiaredirect.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

    [2.13,2.13.21)
    • M
    Information Exposure

    zope2 is a Zope2 application server / web framework The object manager implementation (objectmanager.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly restrict access to internal methods, which allows remote attackers to obtain sensitive information via a crafted request.

    [2.13,2.13.21)
    • L
    Denial of Service (DoS)

    zope2 is a Zope2 application server / web framework (1) cb_decode.py and (2) linkintegrity.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote authenticated users to cause a denial of service (resource consumption) via a large zip archive, which is expanded (decompressed).

    [2.13,2.13.21)
    • M
    HTTP Header Injection

    zope2 is a Zope2 application server / web framework ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

    [2.12,2.13.19)
    • M
    Arbitrary Code Execution

    zope2 is a Zope2 application server / web framework python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

    [2.13,2.13.20)
    • M
    Privilege Escalation

    zope2 is a Zope2 application server / web framework The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

    [,2.12.21)[2.13,2.13.11)
    • M
    Information Exposure

    zope2 is a Zope2 application server / web framework ftp.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read hidden folder contents via unspecified vectors.

    [2.12,2.12.27)[2.13,2.13.20)
    • M
    Cross-site Scripting (XSS)

    zope2 is a Zope2 application server / web framework Cross-site Scripting (XSS) vulnerability in widget_traversal.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

    [2.12,2.12.27)[2.13,2.13.20)
    • M
    Timing Attack

    zope2 is a Zope2 application server / web framework AccessControl/AuthEncoding.py in Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain passwords via vectors involving timing discrepancies in password validation.

    [,2.13.19)
    • M
    Insecure Randomness

    zope2 is a Zope2 application server / web framework Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2).

    [,2.13.19)
    • H
    Arbitrary Code Execution

    zope2 is a Zope2 application server / web framework.

    Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute arbitrary commands via vectors related to the p_ class in OFS/misc_.py and the use of Python modules.

    [2.12,2.12.20)[2.13,2.13.10)
    • H
    Privilege Escalation

    zope2 is a Zope2 application server / web framework Unspecified vulnerability in (1) Zope 2.12.x before 2.12.19 and 2.13.x before 2.13.8, as used in Plone 4.x and other products, and (2) PloneHotfix20110720 for Plone 3.x allows attackers to gain privileges via unspecified vectors, related to a "highly serious vulnerability." NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-0720.

    [2.12,2.12.19)[2.13,2.13.8)
    • H
    Privilege Escalation

    zope2 is a Zope2 application server / web framework Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors.

    [2.13,2.13.2]