Логотип exploitDog
bind:CVE-2021-32633
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-32633

Количество 2

Количество 2

nvd логотип

CVE-2021-32633

больше 4 лет назад

Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-5pr9-v234-jw36

больше 4 лет назад

Remote Code Execution via traversal in TAL expressions

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-32633

Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.

CVSS3: 6.8
1%
Низкий
больше 4 лет назад
github логотип
GHSA-5pr9-v234-jw36

Remote Code Execution via traversal in TAL expressions

CVSS3: 6.8
1%
Низкий
больше 4 лет назад

Уязвимостей на страницу