[Zope-dev] post security update analysis

Jamie Heilman jamie at audible.transient.net
Sat Jan 17 07:20:34 EST 2004


Now that we've reached closure on some of the outstanding security
issues in Zope there's a lot of stuff in the Collector that needs to
be revisited...

Brian Lloyd wrote:
>   - For loops, list comprehensions, and other iterations in untrusted code
>   - List and dictionary instance methods in untrusted code
>   - Use of  import as  in untrusted code
>   - Use of min, max, enumerate, iter, and sum in untrusted code
>   - Broken binding validation in untrusted code
>   - Unpacking in untrusted code
>   - PythonScript class security not initialized properly
>   - PropertyManager 'lines' and 'tokens' properties stored as list
>   - Configuration file did not override security policy selection

AFAIK there weren't any public bugs related to these problems, except
for maybe issue #28 which can probably be taken out of deferred status
and placed into resolved now.

>   - Unicode passed to RESPONSE.write() could shutdown process

I could have sworn there was a bug report related to this but I can't
find it now.

>   - XML-RPC instance marshaling may disclose protected values

issue #410, I can't comment on the effectiveness of this solution, I
removed XML-RPC from my tree ages ago, I am currious if anyone has a
test-case/exploit for this issue though

>   - DTML tag dtml-tree may allow DoS attack

issue #604 can be marked resolved now

>   - Potential cross-site scripting problem in default ZSearch interface

issue #734 can be marked resolved now

>   - Proxy rights on DTMLMethods transferred via acquisition

I believe this means issue #743 and issue #977 can be resolved now.
Actually, #977 already was rejected IIRC but its never been marked as
public which is rather irritating.  

>   - Improper security assertions on DTMLDocument objects

probably fixes issue #865, but because Zope-HEAD doesn't actually run
right now, due to a myriad of other bugs, I actually haven't tested it

>   - Inadequate security assertions on admin "find" functions

issue #1000 can be marked resolved now

The patchset for 813's xss issues seems to have been partially
applied.  I still need to update my patch against HEAD for the xss
holes that haven't been closed.  I'll post an update to the collector
when its ready.

-- 
Jamie Heilman                     http://audible.transient.net/~jamie/
"Paranoia is a disease unto itself, and may I add, the person standing
 next to you may not be who they appear to be, so take precaution."
						-Sathington Willoughby



More information about the Zope-Dev mailing list