logo

CVE-2023-44389 zope

Package

Manager: pip
Name: zope
Vulnerable Version: >=4.0.0 <4.8.11 || >=5.0.0 <5.8.6

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00339 pctl0.55987

Details

Zope management interface vulnerable to stored cross site scripting via the title property ### Impact The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI) because the title property is displayed unquoted in the breadcrumbs element. All versions of Zope 4 and Zope 5 are affected. ### Patches Patches will be released with Zope versions 4.8.11 and 5.8.6. ### Workarounds Make sure only Manager users can edit and view Zope objects in the Zope Management Interface. This is the default.

Metadata

Created: 2023-10-04T18:50:25Z
Modified: 2024-11-19T19:15:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-m755-gxxg-r5qh/GHSA-m755-gxxg-r5qh.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-m755-gxxg-r5qh
Finding: F425
Auto approve: 1