Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1tNzU1LWd4eGctcjVxaM4AA2Pw

Zope management interface vulnerable to stored cross site scripting via the title property

Impact

The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI) because the title property is displayed unquoted in the breadcrumbs element. All versions of Zope 4 and Zope 5 are affected.

Patches

Patches will be released with Zope versions 4.8.11 and 5.8.6.

Workarounds

Make sure only Manager users can edit and view Zope objects in the Zope Management Interface. This is the default.

Permalink: https://github.com/advisories/GHSA-m755-gxxg-r5qh
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tNzU1LWd4eGctcjVxaM4AA2Pw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 7 months ago
Updated: 6 months ago


CVSS Score: 3.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N

Identifiers: GHSA-m755-gxxg-r5qh, CVE-2023-44389
References: Repository: https://github.com/zopefoundation/Zope
Blast Radius: 6.4

Affected Packages

pypi:Zope
Dependent packages: 11
Dependent repositories: 113
Downloads: 46,535 last month
Affected Version Ranges: >= 4.0.0, < 4.8.11, >= 5.0.0, < 5.8.6
Fixed in: 4.8.11, 5.8.6
All affected versions: 4.1.1, 4.1.2, 4.1.3, 4.2.1, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.5.5, 4.6.1, 4.6.2, 4.6.3, 4.8.1, 4.8.2, 4.8.3, 4.8.4, 4.8.5, 4.8.6, 4.8.7, 4.8.8, 4.8.9, 4.8.10, 5.1.1, 5.1.2, 5.2.1, 5.5.1, 5.5.2, 5.7.1, 5.7.2, 5.7.3, 5.8.1, 5.8.2, 5.8.3, 5.8.4, 5.8.5
All unaffected versions: 4.8.11, 5.8.6