Описание
Zope Object Database (ZODB) Authentication bypass in ZEO storage servers
Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-0669
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52379
- https://github.com/pypa/advisory-database/tree/main/vulns/zodb3/PYSEC-2009-9.yaml
- http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html
- http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2
Пакеты
ZODB3
< 3.8.2
3.8.2
Связанные уязвимости
Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol.
Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol.
Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol.
Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации