Executive Summary

Summary
Title insufficient protection for zope Image and File objects
Informations
Name DSA-007 First vendor Publication 2000-12-20
Vendor Debian Last vendor Modification 2000-12-20
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A busy week for the Zope team: on Monday another security alert was released revealing a potential problem found by Peter Kelly. This problem involved incorrect protection of data updating for Image and File objects: any user with DTML editing privileges could update the File or Image object data directly.

This has been fixed in version 2.1.6-5.4 by including the 2000-12-19 hotfix, and we recommend that you upgrade your zope package immediately.

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

Debian GNU/Linux 2.2 alias potato

Original Source

Url : http://www.debian.org/security/2000/dsa-007

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-58 Restful Privilege Elevation

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 11

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 007-1 (zope)
File : nvt/deb_007_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
6283 Zope Image and File Update Data Protection Bypass

Zope contains a flaw that may allow a malicious user to bypass data protection. The issue is triggered due to insecure data updating methods on Image and File objects. It is possible that the flaw may allow a malicious user with DTML editing privileges to modify the raw data of these objects, resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2012-09-06 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2000-086.nasl - Type : ACT_GATHER_INFO
2000-12-19 Name : The remote web server contains an application server that fails to protect st...
File : zope_img_updating.nasl - Type : ACT_GATHER_INFO