You are not logged in Log in Join
You are here: Home » Members » ajung » Security Advisory for Zope 2.7 + 2.8 » View NewsItem

Log in
Name

Password

 

Security Advisory for Zope 2.7 + 2.8

Synopsis:

Due to an error in the cAccessControl module of Zope it is possible to bring down a complete Zope site as documented in

http://mail.zope.org/pipermail/zope-dev/2004-December/024087.html

This exploit causes a segmentation fault of the Python interpreter.

Vulnerable for this exploit are at least all Zope installations that allow untrusted users to edit ZPTs (possibly DTML as well) either through the ZMI or through the file system.

Affected versions:

Zope 2.7.X, Zope 2.8.X

Recommended solution:

Turn off cAccessControl and enable the Python AccessControl implementation in etc/zope.conf (this line is commented in the default configuration):

security-policy-implementation python

A fixed implementation of cAccessControl will be included in the upcoming Zope 2.7.4 beta 2 release.