Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1tNzU1LWd4eGctcjVxaM4AA2Pw
Zope management interface vulnerable to stored cross site scripting via the title property
Impact
The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI) because the title property is displayed unquoted in the breadcrumbs element. All versions of Zope 4 and Zope 5 are affected.
Patches
Patches will be released with Zope versions 4.8.11 and 5.8.6.
Workarounds
Make sure only Manager users can edit and view Zope objects in the Zope Management Interface. This is the default.
Permalink: https://github.com/advisories/GHSA-m755-gxxg-r5qhJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tNzU1LWd4eGctcjVxaM4AA2Pw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 3.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N
Identifiers: GHSA-m755-gxxg-r5qh, CVE-2023-44389
References:
- https://github.com/zopefoundation/Zope/security/advisories/GHSA-m755-gxxg-r5qh
- https://github.com/zopefoundation/Zope/commit/21dfa78609ffd8b6bd8143805678ebbacae5141a
- https://github.com/zopefoundation/Zope/commit/aeaf2cdc80dff60815e3706af448f086ddc3b98d
- https://nvd.nist.gov/vuln/detail/CVE-2023-44389
- https://github.com/pypa/advisory-database/tree/main/vulns/zope/PYSEC-2023-193.yaml
- https://github.com/advisories/GHSA-m755-gxxg-r5qh
Blast Radius: 6.4
Affected Packages
pypi:Zope
Dependent packages: 12Dependent repositories: 113
Downloads: 1,574,027 last month
Affected Version Ranges: >= 4.0.0, < 4.8.11, >= 5.0.0, < 5.8.6
Fixed in: 4.8.11, 5.8.6
All affected versions: 4.1.1, 4.1.2, 4.1.3, 4.2.1, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.5.5, 4.6.1, 4.6.2, 4.6.3, 4.8.1, 4.8.2, 4.8.3, 4.8.4, 4.8.5, 4.8.6, 4.8.7, 4.8.8, 4.8.9, 4.8.10, 5.1.1, 5.1.2, 5.2.1, 5.5.1, 5.5.2, 5.7.1, 5.7.2, 5.7.3, 5.8.1, 5.8.2, 5.8.3, 5.8.4, 5.8.5
All unaffected versions: 4.8.11, 5.8.6, 5.11.1