PyPi: Zope

CVE-2023-44389

Safety vulnerability ID: 61581

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 04, 2023 Updated at May 18, 2024
Scan your Python projects for vulnerabilities →

Advisory

Zope 4.8.11 and 5.8.6 include a fix for CVE-2023-44389: The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI). All versions of Zope 4 and Zope 5 are affected.
https://github.com/zopefoundation/Zope/security/advisories/GHSA-m755-gxxg-r5qh

Affected package

zope

Latest version: 5.10

Zope application server / web framework

Affected versions

Fixed versions

Vulnerability changelog

------------------

- Make sure the object title in the ZMI breadcrumbs is quoted
to prevent a cross-site scripting issue.

- Update to newest compatible versions of dependencies.

- Base the inline/attachment logic developed for CVE-2023-42458
on the media type proper (ignore parameters and
whitespace and normalize to lowercase)
(`1167 <https://github.com/zopefoundation/Zope/pull/1167>`_).

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 4.8

CVSS v3 Details

MEDIUM 4.8
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
HIGH
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
LOW
Availability Availability (A)
NONE