You are not logged in Log in Join
You are here: Home » Download Zope Products » Zope » All Zope Hotfixes

Log in
Name

Password

 
 
Hotfix_2001-08-04

This hotfix addresses an important security issue that affects Zope version 2.3.3, all Zope 2.4.0 alpha and beta releases, as well as the final release of Zope 2.4.0.

The issue involves an error in the _check_context method of the AccessControl.User.BasicUser class. The bug made it possible to access Zope objects via acquisition that a user would not

otherwise have access to. This issue could allow users with enough internal knowledge of Zope to perform actions higher in the object

hierarchy than they should be able to.

We highly recommend that any Zope site running Zope 2.3.3, Zope 2.4.0 final or any alpha or beta version of 2.4.0 have this hotfix product installed to mitigate the issue. Zope 2.4.1 will contain a

fix for the issue, at which time the hotfix can be removed. Zope

versions prior to 2.3.3 are not affected by this issue.

Thanks to Ron Bickers for providing a reproducible test case

README

http://www.zope.org/Products/Zope/Hotfix_2001-08-04/Hotfix_2001_08_04.tgz

Hotfix-200400807
Hotfix-2006-07-05
Hotfix-2006-08-21
Hotfix-2007-03-20

Overview

This hotfix removes the exploit by mandating that security setting alterations can only be made through POST requests. This vulnerability has been fixed in the Zope 2.8, 2.9 and 2.10 branches and all future releases of Zope will include this fix.

Do note that this patch only affects direct requests to the security methods; any 3rd-party code that calls these methods indirectly may still be affected.

Hotfix

We have prepared a hot fix for this problem at:

http://www.zope.org/Products/Zope/Hotfix-2007-03-20/Hotfix-20070320/.

This hotfix should be installed as soon as possible.

To install, simply extract the archive into your Products directory in your Zope installation.

See: http://www.zope.org/Products/Zope/Hotfix-2007-03-20/Hotfix-20070320/README.txt,

for installation instructions.

References

CVE
CVE-2007-0240
Hotfix_2002-06-14

The issue involves the security of the indexes of ZCatalog objects. A flaw in the security settings of ZCatalog allows anonymous users to call arbitrary methods of catalog indexes. The vulnerability also allows untrusted code to do the same.

We highly recommend that any Zope site running Zope 2.4.0 through Zope 2.5.1 have this hotfix product installed to mitigate the issue. Zope 2.6 will contain a fix for the issue, at which time the hotfix can be removed.

You may obtain this hotfix at:

Hotfix_2001-09-28

This hotfix addresses an important security issue that affects Zope versions 2.2.0 through 2.4.1.

The issue involves the "fmt" attribute of dtml-var tags. Without this correction, Zope does not check security access to methods invoked through "fmt". This issue could allow partially trusted users with enough knowledge of Zope to call, in a limited way, methods they would not otherwise be allowed to access.

We highly recommend that any Zope site running Zope 2.2.0 through Zope 2.4.1 have this hotfix product installed to mitigate the issue. Zope 2.4.2 will contain a fix for the issue, at which time the hotfix can be removed.

README

http://www.zope.org/Products/Zope/Hotfix_2001-09-28

Hotfix_2002-04-15

This hotfix addresses an important security issue that may affect some users of Zope versions 2.0 through 2.5.1 b1.

The issue involves a vulnerability involving "through the web code" inadvertently allowing an untrusted user to remotely shut down a Zope server by allowing the user to inject special headers into the response. If you allow untrusted users to write "through the web" code like Python Scripts, DTML Methods, or Page Templates, your Zope server is vulnerable.

We highly recommend that any Zope site have this hotfix product installed to mitigate the issue. Zope 2.5.1b2 and 2.4.4b2 as well as subsequent Zope release versions will contain a fix for the issue, at which time the hotfix can be removed.

README

http://www.zope.org/Products/Zope/Hotfix_2002-04-15/Affects Zope 2.0 - 2.5.1/Hotfix_2002-04-15.tgz

Hotfix_2002-03-01

This hotfix addresses an important security issue that may affect some users of Zope versions 2.2.0 through 2.5.x

The issue involves the checking of security for objects with proxy roles. The context of the owner user that created the object with proxy roles was not being taken into account when determining access to the object with proxy roles. This flaw could allow users defined in subfolders of a site with sufficient privileges to access objects at higher levels in the site that they would not normally be able to access.

We highly recommend that any Zope site running Zope 2.2.0 through Zope 2.5.x have this hotfix product installed to mitigate the issue. Zope 2.5.1 and 2.4.4 will contain a fix for the issue, at which time the hotfix can be removed.

README

http://www.zope.org/Products/Zope/Hotfix_2002-03-01/Hotfix_2002-03-01.tgz

Hotfix_2000-10-02

This hotfix addresses an important security issue that affects Zope versions 2.2.0, 2.2.1, and 2.2.2.

It is sometimes possible to access, through a URL only, objects protected by a role which the user has in some context, but not in the context of the accessed object.

Currently, the validate() method of all known user folder implementations validates against the users' roles in the context of PARENTS[0]. PARENTS[0] refers to the acquisition context of the object being published. All security checks, however, should check an object's containment, not its acquisition context.

validate(), therefore, needs to verify the user's roles in the context of the object being published. This hotfix forces that to occur by temporarily leaving the object at PARENTS[0] then removing it after validation has been performed.

Unfortunately, this is not an ideal correction. In the near future all user folder validate() implementations need to perform security checks using the new Zope security policy subsystem. Until that is completed, this hotfix should close the security problem.

While we know of no instances of this issue being used to exploit a site, we recommend that any Zope 2.2.x site that is accessible by untrusted clients have this hotfix product installed to mitigate the issue.

README

http://www.zope.org/Products/Zope/Hotfix_2000-10-02/Hotfix_2000-10-02.tar.gz

The hotfix will work for all versions of Zope 2.2.0 and higher. A future version of Zope will contain the fix for this issue, and you will be able to uninstall the hot fix after upgrading.

Hotfix_2000-12-08

This hotfix addresses an important security issue that affects Zope versions 2.2.0 up to and including Zope 2.2.4. (Zope 2.1.x is not affected by this issue).

The issue involves security registration of "legacy" names for certain object constructors such as the constructors for DTML Method objects. Security was not being applied correctly for the legacy names, making it possible to call those constructors without the permissions that should have been required. This issue could allow anonymous users with enough internal knowledge of Zope to instantiate new DTML Method instances through the Web.

We highly recommend that any Zope site running versions of Zope 2.2.0 up to and including 2.2.4 have this hotfix product installed to mitigate the issue.

README

http://www.zope.org/Products/Zope/Hotfix_2000-12-08/Hotfix_2000-12-08.tgz

The hotfix will work for all versions of Zope 2.2.0 and higher. A future version of Zope will contain the fix for this issue, and you will be able to uninstall the hot fix after upgrading.

Hotfix_2001-03-08

This hotfix addresses an important security issue that affects Zope version 2.3.0 and the current 2.3.1 beta 1 release.

The issue involves an error in the aq_inContextOf method of objects that support acquisition. A recent change to the access validation machinery made this bug begin to affect security restrictions. The bug, with the change to validation, made it possible to access Zope objects via acquisition that a user would not otherwise have access to. This issue could allow users with enough internal knowledge of Zope to perform actions higher in the object hierarchy than they should be able to.

We highly recommend that any Zope site running Zope 2.3.0 final or any alpha or beta version of 2.3.0 or 2.3.1 beta 1 have this hotfix product installed to mitigate the issue. Zope 2.3.1 beta 2 will contain a fix for the issue, at which time the hotfix can be removed. Zope versions prior to 2.3.0 are not affected by this issue.

README

http://www.zope.org/Products/Zope/Hotfix_2001-03-08/Hotfix_2001-03-08.tgz

Hotfix-2005-04-05
Hotfix_2001-07-25

This hotfix addresses a potential denial-of-service vulnerability in applications that use the Python cgi module (cgi.py) for parsing of "multipart" Web form data (Zope uses this functionality internally).

More detailed information is available in the Python bug tracker at SourceForge:

http://sourceforge.net/tracker/?group_id=5470&atid=105470&func=detail&aid=443120

While we are not aware of any instances of abuse of this vulnerability, we highly recommend that any Zope site running versions of Zope up to and including 2.4.0 have this hotfix product installed to mitigate this issue. (Zope 2.4.1 will not require the installation of a separate hotfix).

README

http://www.zope.org/Products/Zope/Hotfix_2001-07-25/Hotfix_2001-07-25.tar.gz

Hotfix_2001-05-01

This hotfix addresses an important security issue that affects all Zope versions up to and including Zope 2.3.2.

The issue is related to ZClasses in that any user can visit a ZClass declaration and change the ZClass permission mappings for methods and other objects defined within the ZClass, possibly allowing for unauthorized access within the Zope instance.

We highly recommend that any Zope site running versions of Zope up to and including 2.3.2 have this hotfix product installed to mitigate this issue. Further releases of Zope 2.3 (as well as Zope 2.4) will contain a fix for the issue, at which time the hotfix can be removed.

README

http://www.zope.org/Products/Zope/Hotfix_2001-05-01/Hotfix_2001-05-01.tgz

Hotfix_2001-02-23

This hotfix addresses and important security issue that affects Zope versions up to and including Zope 2.3.1 b1.

The issue is related to ZClasses in that a user with through-the-web scripting capabilities on a Zope site can view and assign class attributes to ZClasses, possibly allowing them to make inappropriate changes to ZClass instances.

This patch also fixes problems in the ObjectManager, PropertyManager, and PropertySheet classes related to mutability of method return values which could be perceived as a security problem.

We highly recommend that any Zope site running versions of Zope up to and including 2.3.1 b1 have this hotfix product installed to mitigate these issues if the site is accessible by untrusted users who have through-the-web scripting privileges.

README

http://www.zope.org/Products/Zope/Hotfix_2001-02-23/Hotfix_2001-02-23.tgz

Hotfix_2000-12-18

This hotfix addresses a potential security issue that affects Zope versions up to and including Zope 2.2.4.

The issue involves incorrect protection of a data updating method on Image and File objects. Because the method was not correctly protected, it was possible for users with DTML editing priveleges to update the raw data of a File or Image object via DTML though they did not have editing priveleges on the objects themselves.

We highly recommend that any Zope site running versions of Zope up to and including 2.2.4 have this hotfix product installed to mitigate the issue if the site is accessible by untrusted users who have DTML editing privileges.

README

http://www.zope.org/Products/Zope/Hotfix_2000-12-18/Hotfix_2000-12-18.tgz

The hotfix will work for all versions of Zope 2.1.x and higher. A Zope 2.2.5 release later this week will contain the fix for this issue, and you will be able to uninstall the hot fix after upgrading.

Hotfix_2000-12-15a

This hotfix addresses an important security issue that affects Zope versions up to and including Zope 2.2.4.

The issue involves the computation of local roles. In some situations the computation was not climbing the correct hierarchy of folders, sometimes granting local roles inappropriately. This could allow users with privileges in one folder to gain the same privileges in another folder.

We highly recommend that any Zope site running versions of Zope up to and including 2.2.4 have this hotfix product installed to mitigate the issue.

README

http://www.zope.org/Products/Zope/Hotfix_2000-12-15a/Hotfix_2000-12-15a.tgz

The hotfix will work for all versions of Zope 2.1.x and higher. A future version of Zope will contain the fix for this issue, and you will be able to uninstall the hot fix after upgrading.

Hotfix_2000-10-11

This hotfix addresses an important security issue that affects Zope versions up to and including Zope 2.2.2.

The issue involves the fact that the subscript notation that can be used to access items of ObjectManagers (Folders) did not correctly restrict return values to only actual sub items. This made it possible to access names that should be private from DTML (objects with names beginning with the underscore _ character). This could allow DTML authors to see private implementation data structures and in certain cases possibly call methods that they shouldn't have access to from DTML.

While we know of no instances of this issue being used to exploit a site, we recommend that any Zope 2.2.x site that allows DTML to be edited by untrusted users apply this Hotfix.

README

http://www.zope.org/Products/Zope/Hotfix_2000-10-11/Hotfix_2000-10-11.tgz

The hotfix will work for all versions of Zope 2.2.0 and higher. A future version of Zope will contain the fix for this issue, and you will be able to uninstall the hot fix after upgrading.

Hotfix_2000-08-17

We recently became aware of an important security issue that affected all released Zope versions prior to 2.2.1. A Hotfix product was released (Hotfix_08_09_2000) to correct the issue, but that hotfix missed one aspect of the issue.

The issue involved the fact that the getRoles method of user objects contained in the default UserFolder implementation returns a mutable Python type. Because the mutable object is still associated with the persistent User object, users with the ability to edit DTML could arrange to give themselves extra roles for the duration of a single request by mutating the roles list as a part of the request processing.

Further investigation revealed that it was possible to access the mutable attribute directly to perform the same exploit. This hotfix release (2000-08-17) has been made to resolve both aspects of the issue. Note that this hotfix supercedes the 2000-08-09 hotfix release.

While we know of no instances of this issue being used to exploit a site, we highly recommend that any Zope site running versions of Zope prior to 2.2.1 have this hotfix product installed to mitigate the issue if the site is accessible by untrusted users who have DTML editing privileges.

A hotfix for this issue in the form of an add-on Zope product has been made available on zope.org. To install the hotfix, simply download and install the package as you would any other Zope add-on product (extract it in the root of your Zope installation). Remember to restart your Zope installation for the hotfix to take effect.

http://www.zope.org/Products/Zope/Hotfix_2000-08-17/Hotfix_2000-08-17.tgz

The hotfix will work for all versions of Zope 2.0 and higher. The forthcoming Zope 2.2.1 release will contain the fix for this issue, and you be able to uninstall the hot fix after upgrading to 2.2.1 or higher (though nothing bad will happen if you don't uninstall it).

Hotfix_08_09_2000

We have recently become aware of an important security issue that affects all released Zope versions prior to 2.2.1 beta 1.

The issue involves the fact that the getRoles method of user objects contained in the default UserFolder implementation returns a mutable Python type. Because the mutable object is still associated with the persistent User object, users with the ability to edit DTML could arrange to give themselves extra roles for the duration of a single request by mutating the roles list as a part of the request processing.

While we know of no instances of this issue being used to exploit a site, we highly recommend that any Zope site running versions of Zope prior to 2.2.1 have this hotfix product installed to mitigate the issue if the site is accessible by untrusted users who have DTML editing privileges.

A hotfix for this issue in the form of an add-on Zope product has been made available on zope.org. To install the hotfix, simply download and install the package as you would any other Zope add-on product (extract it in the root of your Zope installation). Remember to restart your Zope installation for the hotfix to take effect.

http://www.zope.org/Products/Zope/Hotfix_08_09_2000/Hotfix_08_09_2000.tgz

The hotfix will work for all versions of Zope 2.0 and higher. The forthcoming Zope 2.2.1 beta 1 release will contain the fix for this issue, and you be able to uninstall the hot fix after upgrading to 2.2.1 beta 1 or higher (though nothing bad will happen if you don't uninstall it).

Hotfix_06_16_2000

We have recently become aware of an important security issue that affects all released Zope versions including the recent 2.2 beta 1 release.

The issue involves an inadequately protected method in one of the base classes in the DocumentTemplate package that could allow the contents of DTMLDocuments or DTMLMethods to be changed remotely or through DTML code without forcing proper user authorization.

A hotfix for this issue in the form of an add-on Zope product has been made available on zope.org. To install the hotfix, simply download and install the package as you would any other Zope add-on product (extract it in the root of your Zope installation). Remember to restart your Zope installation for the hotfix to take effect.

http://www.zope.org/Products/Zope/Hotfix_06_16_2000/Hotfix_06_16_2000.tgz

The hotfix will work for all versions of Zope 2.0 and higher, including the recent 2.2 alpha and beta releases. The forthcoming Zope 2.2 beta 2 release will contain a fix for this issue, and you be able to uninstall the hot fix after upgrading to 2.2. (though nothing bad will happen if you don't uninstall it).

Note that the 2.1.7 release that was initially made to address this issue has been pulled in favor of this hotfix product, which will allow managers of Zope sites to address this issue without worrying about other implications of upgrading their installations.

While we know of no instances of this issue being used to exploit a site, we highly recommend that any Zope site that is accessible by untrusted clients install the 06/16/2000 hotfix product immediately.