[Zope] Zope 4.6 and 5.2 released with an important security fix

Jürgen Gmach juergen.gmach at apis.de
Fri May 21 10:25:51 GMT 2021


Thank you very much for the fix and the new release.

As a user of plain Zope, and having already applied PloneHotfix20210518, I wonder whether I need or should deinstall the hotfix now.

e.g. the hotfix also touched xmlrpc, which this new release does not.

Or let me rephrase my question.

What is the current recommended way to mitigate the announced vulnerabilities for a plain Zope setup?

Install the just released Zope version and the hotfix? Or just the latest Zope version?

Thank you!
________________________________
Von: Zope <zope-bounces at zope.org> im Auftrag von Jens Vagelpohl <jens at netz.ooo>
Gesendet: Freitag, 21. Mai 2021 11:12
An: zope-announce at zope.org <zope-announce at zope.org>; zope at zope.org Users <zope at zope.org>
Betreff: [Zope] Zope 4.6 and 5.2 released with an important security fix

On behalf of Zope developer community I am pleased to announce the releases of Zope 4.6 and 5.2.

This bugfix release solves a few minor issues and also contains an important security fix, see below. For the full list of changes see the change logs at https://zope.readthedocs.io/en/4.x/changes.html#id1 and https://zope.readthedocs.io/en/latest/changes.html#id1

Installation instructions can be found at https://zope.readthedocs.io/en/4.x/INSTALL.html and https://zope.readthedocs.io/en/latest/INSTALL.html.

NOTE: These releases contain a security fix that prevents remote code execution through TAL expressions. You will only be at risk if you allow untrusted people to add or edit Zope Page Template objects. For more details, see the security advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36. A CVE has been requested through GitHub.

NOTE FOR PLONE USERS: Before installing Zope 4.6 or 5.2 make sure to install PloneHotfix20210518 first, see https://plone.org/security/hotfix/20210518. The security changes in Zope break some Plone add-ons that relied on the old insecure traversal behavior. PloneHotfix20210518 ensures support for those Plone add-ons.

Jens Vagelpohl
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.zope.org/pipermail/zope/attachments/20210521/dcd39741/attachment.htm>


More information about the Zope mailing list