Vulnerabilities > CVE-2001-0567 - Unspecified vulnerability in Zope 7.1/7.2

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
zope
nessus

Summary

Digital Creations Zope 2.3.2 and earlier allows a local attacker to gain additional privileges via the changing of ZClass permission mappings for objects and methods in the ZClass.

Vulnerable Configurations

Part Description Count
Application
Zope
2

Nessus

  • NASL familyWeb Servers
    NASL idZOPE_ZCLASS.NASL
    descriptionThe remote web server uses a version of Zope which is older than version 2.3.3. In such versions, any user can visit a ZClass declaration and change the ZClass permission mappings for methods and other objects defined within the ZClass, possibly allowing for unauthorized access within the Zope instance. *** Nessus solely relied on the version number of the server, so if *** the hotfix has already been applied, this might be a false positive
    last seen2020-06-01
    modified2020-06-02
    plugin id10777
    published2001-09-28
    reporterThis script is Copyright (C) 2001-2018 Alert4Web.com
    sourcehttps://www.tenable.com/plugins/nessus/10777
    titleZope < 2.3.3 ZClass Permission Mapping Modification Local Privilege Escalation
    code
    #
    # This script was written by Georges Dagousset <[email protected]>
    #
    # See the Nessus Scripts License for details
    #
    
    # Changes by Tenable:
    # - Updated to use compat.inc (11/16/09)
    # - Revised plugin title (9/23/09)
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(10777);
     script_version ("1.25");
     script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
     script_cve_id("CVE-2001-0567");
     
     script_name(english:"Zope < 2.3.3 ZClass Permission Mapping Modification Local Privilege Escalation");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote web server contains an application server that is prone
    to a privilege escalation flaw." );
     script_set_attribute(attribute:"description", value:
    "The remote web server uses a version of Zope which is older than
    version 2.3.3.  In such versions, any user can visit a ZClass
    declaration and change the ZClass permission mappings for methods and
    other objects defined within the ZClass, possibly allowing for
    unauthorized access within the Zope instance. 
    
    *** Nessus solely relied on the version number of the server, so if 
    *** the hotfix has already been applied, this might be a false positive" );
     script_set_attribute(attribute:"see_also", value:"http://www.zope.org/Products/Zope/Hotfix_2001-05-01/security_alert" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to Zope 2.3.3 or apply the hotfix referenced in the vendor
    advisory above." );
     script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2001/09/28");
     script_set_attribute(attribute:"vuln_publication_date", value: "2001/05/01");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_end_attributes();
    
     script_summary(english:"Checks Zope version");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2001-2020 Alert4Web.com");
     script_family(english:"Web Servers");
     script_dependencie("find_service1.nasl", "http_version.nasl");
     script_require_ports("Services/www", 80);
     script_require_keys("www/zope");
     exit(0);
    }
    
    #
    # The script code starts here
    #
    
    include("global_settings.inc");
    include("http_func.inc");
    
    
    port = get_http_port(default:80, embedded:TRUE);
    
    banner = get_http_banner(port:port);
    
    if(banner)
    {
      if(egrep(pattern:"Server: .*Zope 2\.((0\..*)|(1\..*)|(2\..*)|(3\.[0-2]))", 
      		string:banner))
         security_warning(port);
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2001-049.NASL
    descriptionAnother problem was discovered in Zope that fixes a problem with ZClasses. Any user can visit a ZClass declaration and change the ZClass permission mappings for methods and other objects defined within the ZClass, possibly allowing for unauthorized access within the Zope instance. The Zope Hotfix 2001-05-01 corrects this problem.
    last seen2020-06-01
    modified2020-06-02
    plugin id61913
    published2012-09-06
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/61913
    titleMandrake Linux Security Advisory : Zope (MDKSA-2001:049)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-055.NASL
    descriptionA new Zope hotfix has been released which fixes a problem in ZClasses. The README for the 2001-05-01 hotfix describes the problem as `any user can visit a ZClass declaration and change the ZClass permission mappings for methods and other objects defined within the ZClass, possibly allowing for unauthorized access within the Zope instance.
    last seen2020-06-01
    modified2020-06-02
    plugin id14892
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14892
    titleDebian DSA-055-1 : zope - remote unauthorized access

Redhat

advisories
rhsa
idRHSA-2001:065