[Zope-Annce] Hotfix for cross-site scripting vulnerability

Martijn Pieters mj at zopatista.com
Tue Mar 20 04:40:30 EDT 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A vulnerability has been discovered in Zope, where by certain types of
misuse of HTTP GET, an attacker could gain elevated privileges. All
Zope versions up to and including 2.10.2 are affected.

Overview

   This hotfix removes the exploit by mandating that security setting
   alterations can only be made through POST requests. This  
vulnerability
   has been fixed in the Zope 2.8, 2.9 and 2.10 branches and all future
   releases of Zope will include this fix.

   Do note that this patch only affects direct requests to the security
   methods; any 3rd-party code that calls these methods indirectly may
   still be affected.

Hotfix

   We have prepared a hot fix for this problem
   at:

   "http://www.zope.org/Products/Zope/Hotfix-2007-03-20/ 
Hotfix-20070320/",
    http://www.zope.org/Products/Zope/Hotfix-2007-03-20/ 
Hotfix-20070320/.

   This hotfix should be installed as soon as possible.

   To install, simply extract the archive into your Products
   directory in your Zope installation.

   See: "http://www.zope.org/Products/Zope/Hotfix-2007-03-20/ 
Hotfix-20070320/README.txt",
         http://www.zope.org/Products/Zope/Hotfix-2007-03-20/ 
Hotfix-20070320/README.txt,

   for installation instructions.

- --
Martijn Pieters

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFF/54F3xaj2GOvgP0RAt2tAJ9YjecowrNAEx08+6GdxNP4sk4aagCfaODt
aeZE9vqYxwF3ICjrHVcAFNE=
=DnMj
-----END PGP SIGNATURE-----


More information about the Zope-Announce mailing list